XShar / Introduction_to_Malware_DevelopmentLinks
Введение в разработку вредоносных программ
☆10Updated 2 years ago
Alternatives and similar repositories for Introduction_to_Malware_Development
Users that are interested in Introduction_to_Malware_Development are comparing it to the libraries listed below
Sorting:
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆98Updated 11 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆288Updated last year
- Reflective DLL Injection Made Bella☆248Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆138Updated 7 months ago
- A robust Windows Process Executable Packer and Launcher implementation written in Rust for Windows x64 systems.☆40Updated last year
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Updated 2 years ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆422Updated last year
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆28Updated last year
- Hide your P/Invoke signatures through other people's signed assemblies☆212Updated last year
- Shellcode Loader Library.☆14Updated 3 months ago
- A .NET malware loader, using API-Hashing to evade static analysis☆209Updated 2 years ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆201Updated 2 years ago
- Inject DLLs into the explorer process using icons☆398Updated 8 months ago
- The best powershell obfuscator ever made☆119Updated 5 months ago
- Injecting DLL into LSASS at boot☆156Updated 8 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆266Updated last year
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆111Updated 2 years ago
- This repository implements Threadless Injection in C☆172Updated 2 years ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆293Updated 8 months ago
- Evasive shellcode loader☆398Updated last year
- Decrypting yandex browser passwords☆26Updated 9 months ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆221Updated last year
- All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming☆235Updated last year
- Generic PE loader for fast prototyping evasion techniques☆243Updated last year
- ( 0day ) Local Privilege Escalation in IObit Malware Fighter☆163Updated 9 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆182Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Updated 3 years ago
- Yandex browser passwords and credit-cards decryption algorithm☆21Updated 9 months ago
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆284Updated last year
- yet another AV killer tool using BYOVD☆300Updated 2 years ago