S12cybersecurity / MalDev-LibLinks
Malware Libraries focused in help Malware Development
☆27Updated 2 years ago
Alternatives and similar repositories for MalDev-Lib
Users that are interested in MalDev-Lib are comparing it to the libraries listed below
Sorting:
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆20Updated 2 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 2 years ago
- Simple C++ Reverse Shell☆13Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- An offensive security framework for writing payloads☆18Updated 3 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆13Updated 2 years ago
- A PowerShell script that simplifies life and therefore... phishing.☆19Updated 3 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 4 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- MalDev & AV-EDR Evasion for Pentesters☆17Updated 2 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Updated 2 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Threat Hijacking Simple Implementation☆17Updated 8 months ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Updated 3 years ago
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- A C2 framework built for my bachelors thesis☆56Updated 11 months ago
- ☆16Updated 5 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆13Updated last year
- A powerful reverse shell generator☆44Updated 3 years ago
- Bypassing File Upload Restriction using Magic Bytes☆21Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆37Updated 3 years ago