RenderZ0n3 / Malware-DevelopmentLinks
☆10Updated 2 years ago
Alternatives and similar repositories for Malware-Development
Users that are interested in Malware-Development are comparing it to the libraries listed below
Sorting:
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆91Updated 6 months ago
- ☆42Updated 8 months ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆36Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- ☆70Updated 2 years ago
- Detect userland hooks placed by AV/EDR☆28Updated 2 years ago
- ☆44Updated last year
- POC tool to abuse windows server failover clusters☆53Updated 6 months ago
- Linux CS bypass technique☆32Updated last year
- ☆61Updated 2 years ago
- ☆15Updated last year
- ☆29Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 10 months ago
- ☆52Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- Microsoft Graph API post-exploitation toolkit☆95Updated last year
- An Ansible collection that installs an ADFS deployment with optional configurations.☆44Updated last month
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Updated 2 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆96Updated 2 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆50Updated 11 months ago
- ☆65Updated 2 years ago
- ☆47Updated 2 years ago
- IAT Unhooking proof-of-concept☆34Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- ☆26Updated 11 months ago
- A python library to create BloodHound OpenGraphs☆48Updated last month
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year