Source code for complete MALicious softWARE books I & II
☆79Oct 10, 2025Updated 6 months ago
Alternatives and similar repositories for mal_ex
Users that are interested in mal_ex are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 3 months ago
- RE for champions☆15Updated this week
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆51Oct 28, 2025Updated 5 months ago
- Load and execute a common object file format (COFF) in the current process☆30Mar 9, 2024Updated 2 years ago
- MDE/MDI Defender setup for Ludus☆55Mar 14, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- .NET assembly loader with patching AMSI and ETW bypass☆33Apr 16, 2025Updated last year
- A Crystal Palace shared library to resolve & perform syscalls☆59Oct 29, 2025Updated 5 months ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 8 months ago
- AppLocker-Based EDR Neutralization☆330Dec 19, 2025Updated 3 months ago
- ☆53Jun 28, 2025Updated 9 months ago
- An open-source tool for efficiently parsing x64dbg trace files (.trace32 & .trace64).☆43Jan 20, 2026Updated 2 months ago
- Coerce Windows authentication by generating, distributing, and cleaning up poisoned files at scale.☆35Mar 22, 2026Updated 3 weeks ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.☆71Mar 24, 2026Updated 3 weeks ago
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated last month
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Updated this week
- a small script to collect information from a management point☆37Jan 19, 2026Updated 2 months ago
- Bloodhound alternative - simple ingestor. It generates low-level commands to exploit the AD easily and automatically: learn and control e…☆68Mar 28, 2026Updated 2 weeks ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆34Oct 3, 2024Updated last year
- Detonate malware on VMs and get logs & detection status☆89Apr 8, 2026Updated last week
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆143Jul 2, 2025Updated 9 months ago
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆285Apr 8, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- maldev obviously☆28May 5, 2025Updated 11 months ago
- Association of Computer Enthusiasts brings you with ACECTF. Test your hacking skills in our thrilling 24-hour cybersecurity challenge. Le…☆15Mar 2, 2025Updated last year
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated 3 weeks ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆16May 12, 2023Updated 2 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- ☆14Feb 25, 2025Updated last year
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆126Jan 29, 2026Updated 2 months ago
- A cmake template for crystal palace☆40Dec 20, 2025Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆39Feb 27, 2026Updated last month
- Help red teams find opsec processes during engagements☆43Dec 7, 2024Updated last year
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 4 months ago
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆24Mar 15, 2026Updated last month
- An example reference design for a proposed BOF PE☆205Jan 23, 2026Updated 2 months ago
- ☆16Mar 22, 2023Updated 3 years ago
- An example of how to use Microsoft Windows Warbird technology☆94Apr 23, 2023Updated 2 years ago