cocomelonc / mdmz_bookLinks
The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware
☆66Updated 2 months ago
Alternatives and similar repositories for mdmz_book
Users that are interested in mdmz_book are comparing it to the libraries listed below
Sorting:
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated 2 weeks ago
- ☆164Updated 10 months ago
- ☆72Updated 11 months ago
- ☆44Updated last year
- Collection of codes focused on Linux rootkits☆192Updated 2 months ago
- ☆161Updated 7 months ago
- ⚠️ Malware Development training ⚠️☆40Updated 10 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆138Updated 7 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆159Updated 4 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆81Updated last year
- Modular framework for automating triaging, malware analysis, and analyst workflows☆44Updated 8 months ago
- RunPE implementation with multiple evasive techniques (2)☆265Updated 3 months ago
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆108Updated 7 months ago
- Offensive Lua.☆221Updated 2 months ago
- OFFZONE 2024 Malware Persistence workshop☆22Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 8 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Updated 2 years ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆65Updated last year
- ☆95Updated last year
- ☆155Updated 8 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆167Updated last year
- ☆85Updated 3 years ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆62Updated last year
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆110Updated 3 years ago
- ☆189Updated last year
- The different ways to dump lsass☆206Updated 5 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 10 months ago
- ☆119Updated last year
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆173Updated 5 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated 2 years ago