Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during red team engagements.
☆42Aug 10, 2025Updated 8 months ago
Alternatives and similar repositories for MalDev-Analyzer-MCP
Users that are interested in MalDev-Analyzer-MCP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notion C2 Profile for Mythic☆42Mar 3, 2026Updated last month
- A BOF for lazy people☆24Apr 4, 2024Updated 2 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆69Mar 11, 2026Updated last month
- ☆13Mar 24, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- DLL injection with Microsoft detours☆22Dec 9, 2025Updated 4 months ago
- Azure apim mini proxy☆55Feb 16, 2026Updated last month
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 3 months ago
- BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation☆119Mar 27, 2026Updated 2 weeks ago
- A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.☆115Mar 30, 2026Updated last week
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- A short scraper looking for a POC of CVE-2024-49112☆13Dec 16, 2024Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 11 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A C# tool for extracting information from SCCM PXE boot media.☆52Jan 14, 2026Updated 2 months ago
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆68Feb 17, 2026Updated last month
- Proof-of-concept implementation of AI-enabled postex DLLs☆52Sep 10, 2025Updated 7 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 8 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆188Mar 14, 2025Updated last year
- A python library to create BloodHound OpenGraphs☆57Feb 4, 2026Updated 2 months ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆110Aug 18, 2025Updated 7 months ago
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆170Jan 12, 2026Updated 2 months ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆81Nov 6, 2025Updated 5 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆70Feb 5, 2026Updated 2 months ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆61Mar 17, 2025Updated last year
- ☆32Jun 1, 2024Updated last year
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆173Jul 31, 2025Updated 8 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆30Nov 18, 2025Updated 4 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆68Jan 5, 2026Updated 3 months ago
- ☆183Oct 21, 2025Updated 5 months ago
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆84Feb 27, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A small How-To on creating your own weaponized WSL file☆125Jul 23, 2025Updated 8 months ago
- A Payload Analysis Framework☆118Oct 9, 2025Updated 6 months ago
- ☆26Aug 8, 2021Updated 4 years ago
- ☆50Jun 4, 2025Updated 10 months ago
- ☆57Nov 18, 2025Updated 4 months ago
- Umbrella will protect your shellcode from the rain.☆30Jun 4, 2025Updated 10 months ago
- A New Exploitation Technique for Visual Studio Projects☆12Nov 5, 2023Updated 2 years ago