cocomelonc / bsprishtina-2024-maldev-workshopLinks
BSides Prishtina 2024 Malware Development and Persistence workshop
☆95Updated 3 months ago
Alternatives and similar repositories for bsprishtina-2024-maldev-workshop
Users that are interested in bsprishtina-2024-maldev-workshop are comparing it to the libraries listed below
Sorting:
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- ☆41Updated last year
- ☆161Updated 6 months ago
- ☆156Updated 3 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆80Updated 4 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆114Updated 3 weeks ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 5 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆55Updated 2 weeks ago
- ☆107Updated 2 years ago
- ☆120Updated last year
- A bunch of scripts and code i wrote.☆143Updated 10 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated last year
- ☆147Updated 10 months ago
- Situational Awareness script to identify how and where to run implants☆65Updated 9 months ago
- Create Anti-Copy DRM Malware☆64Updated last year
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆105Updated last year
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆87Updated 4 months ago
- ☆108Updated 10 months ago
- A Mythic Agent written in PIC C.☆199Updated 7 months ago
- ☆84Updated 3 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Do some DLL SideLoading magic☆86Updated last year
- OFFZONE 2024 Malware Persistence workshop☆19Updated 8 months ago
- ☆58Updated 4 months ago
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆88Updated 2 months ago
- ☆157Updated 9 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆52Updated last year
- Command and Control (C2) framework☆131Updated 3 months ago
- Local & remote Windows DLL Proxying☆165Updated last year