The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware
☆75Nov 12, 2025Updated 5 months ago
Alternatives and similar repositories for mdmz_book
Users that are interested in mdmz_book are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BSides Prishtina 2024 Malware Development and Persistence workshop☆132Updated this week
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP☆24May 11, 2025Updated 11 months ago
- Malware Development for Ethical Hackers, published by Packt☆476Jan 29, 2026Updated 2 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated last month
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 11 months ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 4 years ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆156May 22, 2025Updated 10 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- rio clone for X11☆26Sep 23, 2024Updated last year
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆36Feb 4, 2026Updated 2 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- bash script for automating subdomain enumeration process either passive or active☆30Feb 24, 2026Updated last month
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆49Apr 7, 2025Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆112Jan 12, 2024Updated 2 years ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- how to get a few pwn points if you don't know how to pwn☆30Jul 6, 2019Updated 6 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Nuclei templates for drupal vulns... far from perfect☆19Jan 9, 2025Updated last year
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- OAuth Device Code Phishing Toolkit☆122Feb 6, 2026Updated 2 months ago
- Pseudo-shell for RCE scenarios: tunnels commands via /tmp sockets to a local daemon, keeps context, no bind or reverse shell needed.☆45Jun 12, 2025Updated 10 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆125Updated this week
- DotRat is a Telegram Rat which includes good features and non privileged persistence. Written in C#☆12Aug 14, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆25Jan 31, 2026Updated 2 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- Hidden Features Full Hidden Access Hidden Desktop Hidden Browsers Hidden Cmd Clone Profile Hidden PowerShell Hidden Explorer Hidde…☆20Sep 30, 2022Updated 3 years ago
- Dataset of packed ELF samples☆21Jan 24, 2026Updated 2 months ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆84Feb 26, 2022Updated 4 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆46Jul 23, 2024Updated last year