archival-0x / menagerieLinks
Cross-platform malware development library for anti-analysis techniques
☆24Updated 4 years ago
Alternatives and similar repositories for menagerie
Users that are interested in menagerie are comparing it to the libraries listed below
Sorting:
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆36Updated 10 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆55Updated last month
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- ☆16Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- ☆21Updated 5 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 5 years ago
- A small library helping to parse commandline parameters (for C/C++)☆57Updated 3 months ago
- NT AUTHORITY\SYSTEM☆39Updated 5 years ago
- ☆31Updated 5 years ago
- Red Team C2 and Post Exploitation code☆37Updated 2 months ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- Various shell code I have written☆17Updated 4 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Dumping credentials through windbg and pykd☆41Updated last year
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- A collection of anti disassembly techniques☆19Updated 8 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated last year
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 8 years ago
- ☆24Updated 3 years ago
- Introductory software reverse engineering tutorial for beginners☆35Updated 6 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- Sources code extracted from malwares for analysis☆39Updated 2 years ago
- ☆48Updated 5 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 6 years ago