XShar / Introduction_to_Malware_DevelopmentLinks
Введение в разработку вредоносных программ
☆10Updated last year
Alternatives and similar repositories for Introduction_to_Malware_Development
Users that are interested in Introduction_to_Malware_Development are comparing it to the libraries listed below
Sorting:
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆82Updated 7 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆288Updated last year
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆27Updated 8 months ago
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆109Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆131Updated 4 months ago
- ☆127Updated 11 months ago
- Reflective DLL Injection Made Bella☆237Updated 8 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆19Updated 5 months ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆392Updated last year
- A .NET malware loader, using API-Hashing to evade static analysis☆207Updated 2 years ago
- Hide your P/Invoke signatures through other people's signed assemblies☆211Updated last year
- ☆22Updated 8 months ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆154Updated 5 months ago
- Injecting DLL into LSASS at boot☆138Updated 4 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆20Updated 4 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆164Updated last year
- Generic PE loader for fast prototyping evasion techniques☆238Updated last year
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆210Updated last year
- Bypass Malware Sandbox Evasion Ram check☆139Updated 2 years ago
- Generate an Alphabetical Polymorphic Shellcode☆116Updated last month
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆270Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆232Updated 10 months ago
- The best powershell obfuscator ever made☆112Updated last month
- PowerShell Obfuscator. A PowerShell script anti-virus evasion tool☆78Updated 10 months ago
- This repository implements Threadless Injection in C☆172Updated last year
- Remote Shellcode Injector☆219Updated 2 years ago
- kernel callback removal (Bypassing EDR Detections)☆190Updated 6 months ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆289Updated last year
- Shellcode Loader Library.☆10Updated this week
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆272Updated 5 months ago