Teach2Breach / mal_exLinks
Source code for complete MALicious softWARE books I & II
☆78Updated 4 months ago
Alternatives and similar repositories for mal_ex
Users that are interested in mal_ex are comparing it to the libraries listed below
Sorting:
- AppLocker-Based EDR Neutralization☆289Updated last month
- ☆163Updated 7 months ago
- A PoC for Early Cascade process injection technique.☆205Updated last year
- early cascade injection PoC based on Outflanks blog post☆236Updated last year
- Obex – Blocking unwanted DLLs in user mode☆280Updated 4 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆97Updated this week
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆165Updated 6 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Updated 5 months ago
- RunPE implementation with multiple evasive techniques (2)☆269Updated 4 months ago
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆50Updated 3 months ago
- A Mythic Agent written in PIC C.☆206Updated last year
- Open Source Implementation of Cobalt Strike's Malleable C2☆90Updated 2 weeks ago
- ☆70Updated last month
- ☆125Updated last month
- Generate an Alphabetical Polymorphic Shellcode☆135Updated 5 months ago
- PoC framework for Sliver compilation☆22Updated last year
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆29Updated 4 months ago
- Windows Session Hijacking via COM☆335Updated last month
- kernel callback removal (Bypassing EDR Detections)☆211Updated 2 months ago
- ☆164Updated 11 months ago
- Direct access to NTFS volumes☆293Updated 5 months ago
- The different ways to dump lsass☆261Updated 5 months ago
- Stage 0☆169Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆208Updated last year
- Shellcode injection using the Windows Debugging API☆165Updated last month
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆72Updated 3 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆168Updated last year
- Ghosting-AMSI☆220Updated 9 months ago
- Activation Context Hijack☆169Updated 6 months ago
- A collection of position independent coding resources☆107Updated 2 months ago