Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during red team engagements.
☆43Aug 10, 2025Updated 7 months ago
Alternatives and similar repositories for MalDev-Analyzer-MCP
Users that are interested in MalDev-Analyzer-MCP are comparing it to the libraries listed below
Sorting:
- Notion C2 Profile for Mythic☆35Mar 3, 2026Updated 2 weeks ago
- A BOF for lazy people☆23Apr 4, 2024Updated last year
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- ☆13Mar 3, 2025Updated last year
- DLL injection with Microsoft detours☆22Dec 9, 2025Updated 3 months ago
- Azure apim mini proxy☆54Feb 16, 2026Updated last month
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 11 months ago
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆66Feb 17, 2026Updated last month
- A C# tool for extracting information from SCCM PXE boot media.☆51Jan 14, 2026Updated 2 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 6 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆189Mar 14, 2025Updated last year
- A python library to create BloodHound OpenGraphs☆56Feb 4, 2026Updated last month
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆108Aug 18, 2025Updated 7 months ago
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆167Jan 12, 2026Updated 2 months ago
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆69Feb 5, 2026Updated last month
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆81Nov 6, 2025Updated 4 months ago
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated last year
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆75Feb 27, 2026Updated 3 weeks ago
- ☆32Jun 1, 2024Updated last year
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆169Jul 31, 2025Updated 7 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆30Nov 18, 2025Updated 4 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆65Jan 5, 2026Updated 2 months ago
- ☆176Oct 21, 2025Updated 5 months ago
- ☆56Mar 13, 2026Updated last week
- A Payload Analysis Framework☆116Oct 9, 2025Updated 5 months ago
- A small How-To on creating your own weaponized WSL file☆124Jul 23, 2025Updated 7 months ago
- ☆50Jun 4, 2025Updated 9 months ago
- ☆27Aug 8, 2021Updated 4 years ago
- ☆57Nov 18, 2025Updated 4 months ago
- Umbrella will protect your shellcode from the rain.☆31Jun 4, 2025Updated 9 months ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆64Dec 25, 2025Updated 2 months ago
- Network Fuzzing Framework☆64Jan 17, 2026Updated 2 months ago