Source code for complete MALicious softWARE books I & II
☆79Oct 10, 2025Updated 6 months ago
Alternatives and similar repositories for mal_ex
Users that are interested in mal_ex are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 3 months ago
- RE for champions☆15Updated this week
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆51Oct 28, 2025Updated 6 months ago
- Load and execute a common object file format (COFF) in the current process☆31Mar 9, 2024Updated 2 years ago
- MDE/MDI Defender setup for Ludus☆56Mar 14, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simple reverse ICMP shell☆14Apr 30, 2024Updated 2 years ago
- .NET assembly loader with patching AMSI and ETW bypass☆33Apr 16, 2025Updated last year
- A Crystal Palace shared library to resolve & perform syscalls☆61Oct 29, 2025Updated 6 months ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 9 months ago
- AppLocker-Based EDR Neutralization☆336Dec 19, 2025Updated 4 months ago
- ☆55Jun 28, 2025Updated 10 months ago
- An open-source tool for efficiently parsing x64dbg trace files (.trace32 & .trace64).☆43Jan 20, 2026Updated 3 months ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.☆72Mar 24, 2026Updated last month
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Coerce Windows authentication by generating, distributing, and cleaning up poisoned files at scale.☆37Mar 22, 2026Updated last month
- Blog/Journal on how to backdoor VSCode extensions☆79Feb 24, 2026Updated 2 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Apr 13, 2026Updated 3 weeks ago
- a small script to collect information from a management point☆37Jan 19, 2026Updated 3 months ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆34Oct 3, 2024Updated last year
- Detonate malware on VMs and get logs & detection status☆88Updated this week
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆146Jul 2, 2025Updated 10 months ago
- Bloodhound alternative - simple ingestor. It generates low-level commands to exploit the AD easily and automatically: learn and control e…☆76Apr 26, 2026Updated last week
- C2-agnostic BOF collection, categorized by attack chain phase. Designed to be small and modular, allowing for quick execution and automat…☆291Apr 26, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- maldev obviously☆28May 5, 2025Updated last year
- Association of Computer Enthusiasts brings you with ACECTF. Test your hacking skills in our thrilling 24-hour cybersecurity challenge. Le…☆15Mar 2, 2025Updated last year
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated last month
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆16May 12, 2023Updated 2 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆11Jun 8, 2023Updated 2 years ago
- ☆14Feb 25, 2025Updated last year
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆128Jan 29, 2026Updated 3 months ago
- A Cobalt Strike Beacon Object File that exploits the BlueHammer vulnerability that to obtain a copy of the SAM database.☆150Apr 15, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A cmake template for crystal palace☆40Dec 20, 2025Updated 4 months ago
- ☆40Feb 27, 2026Updated 2 months ago
- Help red teams find opsec processes during engagements☆43Dec 7, 2024Updated last year
- arm64 linux position-independent shellcode framework☆31Dec 12, 2025Updated 4 months ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆34Oct 22, 2024Updated last year
- BOF POC of the DSCourier project / invoking WinGet via COM☆78Apr 23, 2026Updated last week
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆25Mar 15, 2026Updated last month