OFFZONE 2024 Malware Persistence workshop
☆22Dec 18, 2024Updated last year
Alternatives and similar repositories for offzone-2024-malware-persistence-workshop
Users that are interested in offzone-2024-malware-persistence-workshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- NailaoLoader: Hiding Execution Flow via Patching☆23Feb 27, 2025Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆12May 31, 2024Updated last year
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago
- Rule Engine for Dynamic Malware Analysis and Research☆25Apr 16, 2025Updated 11 months ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Jun 5, 2022Updated 3 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆129Mar 15, 2026Updated last week
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Jul 23, 2025Updated 8 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- ☆21Jan 8, 2026Updated 2 months ago
- Vulnerabilities exploitation examples, python☆23May 22, 2023Updated 2 years ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 11 months ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 8 months ago
- IDA Python scripts☆42Apr 11, 2025Updated 11 months ago
- Binary Ninja plugin to analyze and simplify obfuscated code☆242Oct 11, 2025Updated 5 months ago
- A malicous Golang Package☆15Apr 21, 2025Updated 11 months ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆25Jan 27, 2025Updated last year
- ☆16Nov 26, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- ☆10Oct 18, 2024Updated last year
- Troll TaskManager, and play with it .☆30Aug 3, 2025Updated 7 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 11 months ago
- CLI generator for Velociraptor offline collector☆16Mar 6, 2026Updated 2 weeks ago
- Commandline spoofing on Windows☆95Nov 25, 2025Updated 3 months ago
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆39Jul 13, 2023Updated 2 years ago
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated 2 years ago
- Slides and materials for the talk Reconstructing Rust Types: A Practical Guide for Reverse Engineers at RE//verse 2025, presented on Febr…☆24May 23, 2025Updated 10 months ago
- ☆34Mar 17, 2026Updated last week
- Bypasses AMSI protection through remote memory patching and parsing technique.☆55May 12, 2025Updated 10 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆23Apr 8, 2025Updated 11 months ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 2 months ago