RenderZ0n3 / Malware-DevelopmentLinks
☆10Updated 2 years ago
Alternatives and similar repositories for Malware-Development
Users that are interested in Malware-Development are comparing it to the libraries listed below
Sorting:
- ☆70Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆33Updated 11 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆96Updated 2 years ago
- Detect userland hooks placed by AV/EDR☆28Updated 2 years ago
- ☆15Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆90Updated 4 months ago
- ☆61Updated 2 years ago
- ☆52Updated last year
- ☆42Updated 6 months ago
- ☆44Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- ☆46Updated last year
- a tiny program to consume from ETW providers for research☆53Updated 11 months ago
- miscellaneous codes☆36Updated 2 years ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆42Updated this week
- ☆26Updated 9 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- malleable profile generator GUI for Havoc☆54Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- ☆24Updated 10 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Updated 2 years ago
- Linux CS bypass technique☆32Updated 10 months ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- ☆65Updated last year
- Microsoft Graph API post-exploitation toolkit☆95Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆48Updated 10 months ago
- Attack chain emulator. Write recipes for initial access easily☆22Updated 9 months ago