XShar / Introduction_to_Malware_Development
Введение в разработку вредоносных программ
☆9Updated last year
Alternatives and similar repositories for Introduction_to_Malware_Development:
Users that are interested in Introduction_to_Malware_Development are comparing it to the libraries listed below
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆109Updated last year
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)☆141Updated 11 months ago
- ☆214Updated last month
- PowerShell script to generate ShellCode in various formats☆41Updated 4 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆103Updated 3 weeks ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆26Updated 11 months ago
- Shellcode obfuscation tool to avoid AV/EDR.☆122Updated last year
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆131Updated 8 months ago
- Bypass Malware Sandbox Evasion Ram check☆136Updated 2 years ago
- A malware-analysis tool that identify the exact position and details of malicious content in binary files using external Anti-Virus scann…☆22Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆156Updated 8 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆55Updated 7 months ago
- ☆33Updated 9 months ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆174Updated last year
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆147Updated last year
- C++ self-Injecting dropper based on various EDR evasion techniques.☆366Updated last year
- Antivirus Signature Search Toolkit☆78Updated last year
- Fud Runpe Av Evasion / All Av Bypass☆32Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 9 months ago
- A command and control framework.☆46Updated last month
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆90Updated 11 months ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆257Updated last week
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated 11 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆273Updated 8 months ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆115Updated last month
- Remote Shellcode Injector☆208Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆81Updated 2 years ago