assume-breach / Malware_ProjectLinks
☆33Updated 2 years ago
Alternatives and similar repositories for Malware_Project
Users that are interested in Malware_Project are comparing it to the libraries listed below
Sorting:
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- Collection of Rust repos useful for Red Teamers.☆32Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated 3 weeks ago
- ☆34Updated 2 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- ☆48Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Beacon Object Files (BOF) for Cobalt Strike.☆31Updated 9 months ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆23Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆18Updated 2 years ago
- An In-memory Embedding of CPython☆28Updated 4 years ago
- in-process powershell runner for BRC4☆45Updated last year
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- ☆48Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 2 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆63Updated 5 months ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆20Updated 2 months ago
- Red Team Operation's Defense Evasion Technique.☆52Updated last year
- IAT Unhooking proof-of-concept☆29Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 2 years ago
- ☆59Updated last year
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆62Updated last year
- XOR-based shellcode encoder☆31Updated 2 years ago
- CSharp4Pentesters☆12Updated 3 years ago