OFFZONE 2024 Malware Persistence workshop
☆22Dec 18, 2024Updated last year
Alternatives and similar repositories for offzone-2024-malware-persistence-workshop
Users that are interested in offzone-2024-malware-persistence-workshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- NailaoLoader: Hiding Execution Flow via Patching☆23Feb 27, 2025Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆12May 31, 2024Updated last year
- Rule Engine for Dynamic Malware Analysis and Research☆25Apr 16, 2025Updated 11 months ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆130Mar 15, 2026Updated last month
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Keklick - C2 Hunting, Reporting and Visualization Tool☆64Jul 23, 2025Updated 8 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆21Jul 24, 2022Updated 3 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆21Jan 8, 2026Updated 3 months ago
- Vulnerabilities exploitation examples, python☆23May 22, 2023Updated 2 years ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Jul 11, 2025Updated 9 months ago
- IDA Python scripts☆42Apr 11, 2025Updated last year
- ☆16Nov 26, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- ☆10Oct 18, 2024Updated last year
- Commandline spoofing on Windows☆101Nov 25, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆39Jul 13, 2023Updated 2 years ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆29Jan 27, 2025Updated last year
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated 2 years ago
- Slides and materials for the talk Reconstructing Rust Types: A Practical Guide for Reverse Engineers at RE//verse 2025, presented on Febr…☆24May 23, 2025Updated 10 months ago
- ☆28Updated this week
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 3 months ago
- CTF source code(s) from multiple websites.☆10May 4, 2025Updated 11 months ago
- Python bindings for Avast antivirus server version for Linux☆15Apr 26, 2014Updated 11 years ago
- ☆14Jul 11, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- Extended Static Analysis Tool for Analyzing Android APK Files.☆15Jan 3, 2024Updated 2 years ago
- Proxy function calls through the thread pool with ease☆31Feb 27, 2025Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 10 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆24Apr 8, 2025Updated last year
- A remote process injection using process snapshotting based on https://gitlab.com/ORCA000/snaploader , in rust. It creates a sacrificial …☆50Jan 25, 2025Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆274Oct 31, 2024Updated last year