XShar / Introduction_to_Malware_DevelopmentLinks
Введение в разработку вредоносных программ
☆10Updated last year
Alternatives and similar repositories for Introduction_to_Malware_Development
Users that are interested in Introduction_to_Malware_Development are comparing it to the libraries listed below
Sorting:
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆23Updated 5 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆55Updated 3 months ago
- The best powershell obfuscator ever made☆109Updated last month
- Test antiviruses☆12Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆118Updated 2 weeks ago
- Decrypting yandex browser passwords☆20Updated 2 months ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆156Updated 2 months ago
- simple user-mode Rootkit☆105Updated 2 years ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆161Updated last year
- Shellcode Loader Library.☆10Updated 4 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆13Updated last month
- Lime Crypter Obfuscator Mod☆30Updated 11 months ago
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆110Updated last year
- kernel-mode DLL Injector☆82Updated last month
- Injecting DLL into LSASS at boot☆113Updated last month
- Stealer in c++.☆39Updated last month
- Generic PE loader for fast prototyping evasion techniques☆231Updated 11 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆70Updated last year
- This repository implements Threadless Injection in C☆167Updated last year
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆285Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆222Updated 7 months ago
- A .NET malware loader, using API-Hashing to evade static analysis☆208Updated 2 years ago
- Reflective DLL Injection Made Bella☆227Updated 5 months ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆66Updated last month
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooks☆153Updated last year
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆15Updated last month
- Hide your P/Invoke signatures through other people's signed assemblies☆211Updated last year
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆274Updated last month