cocomelonc / bsprishtina-2024-maldev-workshopLinks
BSides Prishtina 2024 Malware Development and Persistence workshop
☆81Updated last week
Alternatives and similar repositories for bsprishtina-2024-maldev-workshop
Users that are interested in bsprishtina-2024-maldev-workshop are comparing it to the libraries listed below
Sorting:
- ☆58Updated 3 months ago
- Create Anti-Copy DRM Malware☆57Updated 9 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 11 months ago
- Situational Awareness script to identify how and where to run implants☆50Updated 5 months ago
- ☆107Updated 7 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 2 months ago
- POC of GITHUB simple C2 in rust☆53Updated 4 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆56Updated 8 months ago
- ☆35Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆65Updated last month
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆105Updated 5 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- ☆141Updated 7 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆48Updated last year
- Do some DLL SideLoading magic☆83Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆45Updated 2 months ago
- ☆107Updated 2 years ago
- ☆72Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆90Updated 7 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- ☆85Updated 2 years ago
- Collection of red team techniques.☆50Updated last month
- Local & remote Windows DLL Proxying☆164Updated 11 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆99Updated 3 weeks ago
- Utilities for obfuscating shellcode☆68Updated 2 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆101Updated last year
- Windows Persistence IT-Security☆100Updated 2 months ago
- Find DLLs with RWX section☆81Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆28Updated 2 years ago