Введение в разработку вредоносных программ
☆11Oct 15, 2023Updated 2 years ago
Alternatives and similar repositories for Introduction_to_Malware_Development
Users that are interested in Introduction_to_Malware_Development are comparing it to the libraries listed below
Sorting:
- Test antiviruses☆12Dec 3, 2023Updated 2 years ago
- Криптор на шелл-кодах☆11May 3, 2020Updated 5 years ago
- Фреймворк криптора/протектора с антиэмуляцией☆32Jun 15, 2019Updated 6 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Jan 6, 2023Updated 3 years ago
- Telegram crash game casino web app with TON, Telegram Stars and gifts in Telegram Mini App☆28Oct 13, 2025Updated 4 months ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- ☆42Mar 24, 2024Updated last year
- AES-encrypted TCP/IP swiss army knife.☆11Nov 6, 2022Updated 3 years ago
- Rust DMA Toolbox☆10Aug 18, 2023Updated 2 years ago
- A Modern, stable and advanced login system.☆13Oct 13, 2021Updated 4 years ago
- ☆12Oct 22, 2023Updated 2 years ago
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆47Jun 15, 2024Updated last year
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- .NET 4.5 Remote Access Tool (RAT) implementation with Telegram's API as server☆11Jul 29, 2022Updated 3 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- UI-элемент Поле для ввода кода подтверждения из смс или email☆11Oct 14, 2021Updated 4 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- simple zero-dependency timer implementation☆12May 24, 2023Updated 2 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- .NET Code Virtualization with cool features. Once intended to sell. Rip VirtualGuard.io☆16Feb 8, 2026Updated 2 weeks ago
- Changes the window titles of running processes.☆10Aug 15, 2019Updated 6 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated last year
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- - Automated Discord bot for Submitting Rebates and getting you easy visa cards. Educational purposes only.☆16May 13, 2021Updated 4 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- ☆11Feb 12, 2023Updated 3 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Utilizing DLang For Offensive Operations.☆14May 29, 2025Updated 9 months ago
- A windows kernel-mode rootkit with remote control☆12Sep 17, 2022Updated 3 years ago
- A bot that escrows crypto transactions on Reddit☆13Oct 16, 2024Updated last year
- 🌐 A curated list of anonymous networks & research papers☆17Oct 15, 2024Updated last year