The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware
☆80Nov 12, 2025Updated 5 months ago
Alternatives and similar repositories for mdmz_book
Users that are interested in mdmz_book are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attack and introduction (info stealer), start your adventure in MMD☆19Sep 14, 2025Updated 7 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆134Apr 18, 2026Updated 2 weeks ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP☆24May 11, 2025Updated 11 months ago
- Malware Development for Ethical Hackers, published by Packt☆484Jan 29, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- ☆13Oct 10, 2018Updated 7 years ago
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆15Nov 20, 2025Updated 5 months ago
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated 2 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 7 months ago
- Professional ConversationalAI system with ConversationalAI-optimized modern-design and enterprise enterprise-grade capabilities☆22Aug 10, 2025Updated 8 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 11 months ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 4 years ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆159May 22, 2025Updated 11 months ago
- A service container for interacting with SRA's VECTR☆17Apr 9, 2025Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆11Oct 6, 2020Updated 5 years ago
- bash script for automating subdomain enumeration process either passive or active☆30Feb 24, 2026Updated 2 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆49Apr 7, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Jan 12, 2024Updated 2 years ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆37Feb 4, 2026Updated 3 months ago
- Malware dev tricks. Syscalls part 1. Simple C example☆12Jun 8, 2023Updated 2 years ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Nuclei templates for drupal vulns... far from perfect☆19Jan 9, 2025Updated last year
- ☆16Sep 23, 2021Updated 4 years ago
- OAuth Device Code Phishing Toolkit☆123Apr 18, 2026Updated 2 weeks ago
- Pseudo-shell for RCE scenarios: tunnels commands via /tmp sockets to a local daemon, keeps context, no bind or reverse shell needed.☆45Jun 12, 2025Updated 10 months ago
- 🧠 The ultimate resource for finding Beacon Object Files (BOFs).☆133Updated this week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- DotRat is a Telegram Rat which includes good features and non privileged persistence. Written in C#☆12Aug 14, 2023Updated 2 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Updated this week
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- Hidden Features Full Hidden Access Hidden Desktop Hidden Browsers Hidden Cmd Clone Profile Hidden PowerShell Hidden Explorer Hidde…☆19Sep 30, 2022Updated 3 years ago
- Dataset of packed ELF samples☆21Jan 24, 2026Updated 3 months ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆84Feb 26, 2022Updated 4 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆46Jul 23, 2024Updated last year