cocomelonc / bsprishtina-2024-maldev-workshopLinks
BSides Prishtina 2024 Malware Development and Persistence workshop
☆99Updated 4 months ago
Alternatives and similar repositories for bsprishtina-2024-maldev-workshop
Users that are interested in bsprishtina-2024-maldev-workshop are comparing it to the libraries listed below
Sorting:
- ☆157Updated 4 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆127Updated 2 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated 2 years ago
- ☆41Updated last year
- ☆161Updated 7 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆100Updated 6 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆84Updated 5 months ago
- ☆108Updated 11 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆58Updated 2 months ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆207Updated 3 weeks ago
- Situational Awareness script to identify how and where to run implants☆67Updated 10 months ago
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆95Updated 4 months ago
- Encodes a payload within a generated mock-CSS file☆59Updated 2 years ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated last year
- Convert your shellcode into an ASCII string☆123Updated 3 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆105Updated last year
- Command and Control (C2) framework☆132Updated 5 months ago
- ☆119Updated last year
- POC of GITHUB simple C2 in rust☆52Updated 2 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Create Anti-Copy DRM Malware☆67Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆132Updated 5 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆128Updated 10 months ago
- A Mythic Agent written in PIC C.☆201Updated 8 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆155Updated 2 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆71Updated last year
- ☆107Updated 2 years ago
- ☆84Updated 3 years ago
- Permanently disable EDRs as local admin☆118Updated 2 weeks ago
- OFFZONE 2024 Malware Persistence workshop☆21Updated 10 months ago