cocomelonc / meowLinks
Cybersecurity research results. Simple C/C++ and Python implementations
☆254Updated 2 weeks ago
Alternatives and similar repositories for meow
Users that are interested in meow are comparing it to the libraries listed below
Sorting:
- Centralized resource for listing and organizing known injection techniques and POCs☆625Updated last month
- Important notes and topics on my journey towards mastering Windows Internals☆409Updated last year
- ☆362Updated last year
- My collection of malware dev links☆284Updated 3 months ago
- Performing Indirect Clean Syscalls☆575Updated 2 years ago
- Collect Windows telemetry for Maldev☆419Updated last week
- Analyse your malware to surgically obfuscate it☆497Updated 3 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆405Updated 3 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆563Updated last month
- A tutorial on how to write a packer for Windows!☆289Updated last year
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆255Updated 10 months ago
- A small x64 library to load dll's into memory.☆449Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆717Updated last month
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆355Updated 7 months ago
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆379Updated 11 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆155Updated 2 years ago
- ☆357Updated 3 months ago
- The Definitive Guide To Process Cloning on Windows☆516Updated last year
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆491Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆268Updated last year
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆105Updated last month
- C++ self-Injecting dropper based on various EDR evasion techniques.☆390Updated last year
- PoCs for Kernelmode rootkit techniques research.☆403Updated last week
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆173Updated 5 months ago
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆327Updated 3 months ago
- ☆324Updated this week
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆734Updated 7 months ago
- Simulate the behavior of AV/EDR for malware development training.☆539Updated last year
- TartarusGate, Bypassing EDRs☆615Updated 3 years ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆329Updated 11 months ago