cocomelonc / bsprishtina-2024-maldev-workshopLinks
BSides Prishtina 2024 Malware Development and Persistence workshop
☆124Updated last month
Alternatives and similar repositories for bsprishtina-2024-maldev-workshop
Users that are interested in bsprishtina-2024-maldev-workshop are comparing it to the libraries listed below
Sorting:
- ☆164Updated 11 months ago
- ☆163Updated 7 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Updated 5 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 10 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆136Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Updated 2 years ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆105Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 9 months ago
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆111Updated 7 months ago
- Injecting DLL into LSASS at boot☆156Updated 9 months ago
- A PoC for Early Cascade process injection technique.☆205Updated last year
- A Mythic Agent written in PIC C.☆206Updated last year
- ☆44Updated last year
- early cascade injection PoC based on Outflanks blog post☆236Updated last year
- Dynamic shellcode loader with sophisticated evasion capabilities☆280Updated 4 months ago
- Activation Context Hijack☆169Updated 6 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Updated last year
- ☆108Updated last year
- Convert your shellcode into an ASCII string☆125Updated 7 months ago
- RunPE implementation with multiple evasive techniques (2)☆268Updated 4 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆165Updated 6 months ago
- Create Anti-Copy DRM Malware☆71Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 11 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆68Updated 2 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Updated last year
- "Service-less" driver loading☆166Updated last year
- ☆159Updated last year
- A bunch of scripts and code i wrote.☆149Updated last year
- Windows rootkit designed to work with BYOVD exploits☆213Updated last year
- ☆60Updated 9 months ago