cr-0w / maldev
⚠️ malware development
☆491Updated 8 months ago
Alternatives and similar repositories for maldev:
Users that are interested in maldev are comparing it to the libraries listed below
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆671Updated this week
- Malware Development for Ethical Hackers, published by Packt☆267Updated 2 months ago
- Pure Malware Development Resource Collections☆202Updated last month
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆167Updated 11 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆646Updated last year
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆603Updated 5 months ago
- My collection of malware dev links☆252Updated 4 months ago
- Organized list of my malware development resources☆1,471Updated 2 years ago
- Koth - TryHackMe Tricks☆157Updated last year
- ☆383Updated this week
- Projects for security students and professionals☆159Updated 6 months ago
- ☆211Updated last year
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆317Updated last year
- A workshop about Malware Development☆1,614Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆651Updated 8 months ago
- PasteBomb C2-less RAT☆316Updated 2 months ago
- ☆331Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆348Updated last month
- Windows Local Privilege Escalation Cookbook☆1,034Updated last week
- Collection of various malicious functionality to aid in malware development☆1,563Updated 11 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆201Updated last week
- Labs for Practical Malware Analysis & Triage☆914Updated 3 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,168Updated last year
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆474Updated 3 weeks ago
- A RedTeam Toolkit☆391Updated 3 months ago
- Embed a payload inside a PNG file☆284Updated 3 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆708Updated this week
- ☆416Updated 2 years ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆272Updated 3 weeks ago
- Malware attacks/techniques explained☆104Updated 2 months ago