XShar / Introduction_to_Malware_DevelopmentLinks
Введение в разработку вредоносных программ
☆10Updated 2 years ago
Alternatives and similar repositories for Introduction_to_Malware_Development
Users that are interested in Introduction_to_Malware_Development are comparing it to the libraries listed below
Sorting:
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆28Updated last year
- Yandex browser passwords and credit-cards decryption algorithm☆22Updated 9 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆99Updated 11 months ago
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆20Updated 3 months ago
- ☆129Updated last year
- Shellcode Loader Library.☆14Updated 4 months ago
- Decrypting yandex browser passwords☆27Updated 9 months ago
- Reflective DLL Injection Made Bella☆248Updated last year
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆111Updated 2 years ago
- The best powershell obfuscator ever made☆119Updated 6 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆138Updated 8 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆288Updated last year
- ( 0day ) Local Privilege Escalation in IObit Malware Fighter☆164Updated 10 months ago
- Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.☆24Updated 2 years ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Updated 2 years ago
- A .NET malware loader, using API-Hashing to evade static analysis☆209Updated 2 years ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆425Updated last year
- Injecting DLL into LSASS at boot☆156Updated 9 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆268Updated last year
- simple user-mode Rootkit☆108Updated 3 years ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆232Updated 2 years ago
- kernel callback removal (Bypassing EDR Detections)☆210Updated 2 months ago
- A robust Windows Process Executable Packer and Launcher implementation written in Rust for Windows x64 systems.☆40Updated last year
- Generate an Alphabetical Polymorphic Shellcode☆135Updated 5 months ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆117Updated this week
- PowerShell Obfuscator. A PowerShell script anti-virus evasion tool☆79Updated last year
- Sleep obfuscation☆264Updated last year
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆223Updated 2 years ago
- EDR & AV Bypass Arsenal— a comprehensive collection of tools, patches, and techniques for evading modern EDR and antivirus defenses.☆50Updated 2 months ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆25Updated 6 months ago