Malware campaigns and APTs research by BlackArrow
☆19Apr 30, 2020Updated 5 years ago
Alternatives and similar repositories for malware-research
Users that are interested in malware-research are comparing it to the libraries listed below
Sorting:
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17May 18, 2021Updated 4 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- ☆12Aug 25, 2023Updated 2 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- my own 2fa bypass methodolgy☆28Sep 22, 2023Updated 2 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated last year
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- ☆13Sep 8, 2024Updated last year
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆14Apr 8, 2024Updated last year
- web based c2 🏴☠️☆15Aug 10, 2024Updated last year
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Sep 13, 2019Updated 6 years ago
- Well, I have created this shit for educational pruposes (I think)☆38Jul 24, 2022Updated 3 years ago
- AzureAD Pentest☆25Mar 24, 2022Updated 3 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- Materials used in preperation for the BSCP certification from PortSwigger☆18Jan 28, 2022Updated 4 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆47Sep 6, 2024Updated last year
- C++ Code Injector Class☆22Oct 2, 2020Updated 5 years ago
- Writeups of Hack The Box machines, Italian and English languages☆15Apr 19, 2021Updated 4 years ago
- ☆25Feb 11, 2024Updated 2 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 7 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Mar 9, 2024Updated last year
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Jun 5, 2022Updated 3 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- Malicious Software SRC Extract☆32Jan 2, 2023Updated 3 years ago
- Project repository for "Evaluating the persuasive influence of political microtargeting with large language models" by Kobi Hackenburg an…☆11Jun 19, 2024Updated last year
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Apr 14, 2019Updated 6 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 4 years ago
- conti locker ransomware source code leak☆31Mar 5, 2022Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- Process Hollowing demonstration & explanation☆35Feb 25, 2021Updated 5 years ago
- BadUSB ile Penetrasyon☆13Jun 15, 2019Updated 6 years ago
- Collection of templates from various resources☆42Dec 5, 2025Updated 2 months ago