A large collection of blogs π¦
β13Apr 12, 2025Updated last year
Alternatives and similar repositories for Awesome-Malware-Blogs
Users that are interested in Awesome-Malware-Blogs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WinDbg plugin to trace module transitions from a debugged driver.β52Dec 22, 2025Updated 4 months ago
- NASM/GoLink OpenGL 1k Frameworkβ13Dec 25, 2017Updated 8 years ago
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libraβ¦β83Nov 6, 2025Updated 5 months ago
- A simple tool that can save your life in an invasion. It consists of the junction of several modules (Commands/Loads) essential in an invβ¦β13Feb 25, 2022Updated 4 years ago
- Re-enables single player cheats on SA-MPβ10Jul 16, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A chat log organizer plugin for SA-MP.β11Dec 10, 2019Updated 6 years ago
- Proxy function calls through the thread pool with easeβ31Feb 27, 2025Updated last year
- β50Jun 6, 2025Updated 10 months ago
- A simple virtual machineβ12Apr 8, 2019Updated 7 years ago
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module systemβ80Mar 7, 2026Updated last month
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targeβ¦β43Apr 6, 2025Updated last year
- Yet another esoteric programming language.β13Feb 12, 2023Updated 3 years ago
- An Undertale related discord bot.β11Sep 28, 2020Updated 5 years ago
- just a basic rootkit for learning how to playing sys_call_tableβ16Sep 12, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Enter Product Key Volatile Environment LPEβ13Jun 28, 2025Updated 10 months ago
- Vectored Exception Handling Squaredβ30Dec 27, 2025Updated 4 months ago
- Overview of Microsoft Patch Tuesdayβ14Sep 13, 2024Updated last year
- Resolve offsets, gadgets and symbols from NTKernelβ61Jan 15, 2026Updated 3 months ago
- CVE-2023-40477 PoC by Wild-Pointerβ24Aug 30, 2023Updated 2 years ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Driveβ¦β37Feb 4, 2026Updated 2 months ago
- Weapons totally controlled by the server.β15Feb 12, 2023Updated 3 years ago
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)β61Jun 15, 2025Updated 10 months ago
- Driver Buddy Revolutions for Ghidraβ46Mar 28, 2026Updated last month
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- NailaoLoader: Hiding Execution Flow via Patchingβ23Feb 27, 2025Updated last year
- TaskMgr Volatile Environment LPEβ16Jun 28, 2025Updated 10 months ago
- The code I write in my blogβ94Feb 21, 2026Updated 2 months ago
- Blog/Journal on how to backdoor VSCode extensionsβ80Feb 24, 2026Updated 2 months ago
- β72Mar 8, 2026Updated last month
- A New Exploitation Technique for Visual Studio Projectsβ44Oct 11, 2023Updated 2 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.β22Feb 20, 2021Updated 5 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilersβ61May 20, 2025Updated 11 months ago
- A simple POC to expose Mythic as a MCP serverβ74Mar 20, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.β75May 1, 2024Updated 2 years ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedroβ79Apr 15, 2025Updated last year
- Shellcode loader based on indirect syscallβ22Feb 9, 2025Updated last year
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代η , ζζ―θ½―δ»Ά, η»θΏβ46May 22, 2025Updated 11 months ago
- VySecator Is a Python Script Obfuscation Tool, Which can be used to Obfuscate your hand written Malwares and your Hand Written Scripts!β71Jun 13, 2024Updated last year
- Parser and reconciliation tooling for large Active Directory environments.β33Feb 18, 2025Updated last year
- using the gpu to hide your payloadβ64Aug 15, 2022Updated 3 years ago