chvancooten / maldev-for-dummies
A workshop about Malware Development
☆1,608Updated last year
Alternatives and similar repositories for maldev-for-dummies:
Users that are interested in maldev-for-dummies are comparing it to the libraries listed below
- Organized list of my malware development resources☆1,469Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,584Updated last month
- This is a repository of resource about Malware techniques☆777Updated last year
- Collection of various malicious functionality to aid in malware development☆1,554Updated 10 months ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆788Updated 3 years ago
- ☆1,019Updated 7 months ago
- Resources for Windows exploit development☆1,552Updated 3 years ago
- Labs for Practical Malware Analysis & Triage☆910Updated 2 months ago
- Research code & papers from members of vx-underground.☆1,174Updated 3 years ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,040Updated this week
- Red Team Cheatsheet in constant expansion.☆1,149Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,752Updated 7 months ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,307Updated 3 weeks ago
- Tools & Interesting Things for RedTeam Ops☆2,165Updated 2 years ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆596Updated 4 months ago
- Offensive Software Exploitation Course☆2,354Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,498Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆699Updated 5 months ago
- Windows Local Privilege Escalation Cookbook☆1,024Updated last month
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,469Updated last week
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆667Updated this week
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,032Updated last year
- OSWE, OSEP, OSED, OSEE☆2,698Updated 7 months ago
- ⚠️ malware development☆487Updated 7 months ago
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,067Updated this week
- Red Teaming Tactics and Techniques☆4,116Updated 4 months ago
- ☆712Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,860Updated last month
- You didn't think I'd go and leave the blue team out, right?☆1,631Updated last year
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆1,942Updated last month