cr-0w / maldevView external linksLinks
⚠️ malware development
☆681May 27, 2024Updated last year
Alternatives and similar repositories for maldev
Users that are interested in maldev are comparing it to the libraries listed below
Sorting:
- 🧞♂️ malware analysis☆38Mar 3, 2024Updated last year
- A workshop about Malware Development☆1,759Jun 2, 2023Updated 2 years ago
- Organized list of my malware development resources☆1,700May 16, 2022Updated 3 years ago
- Collection of various malicious functionality to aid in malware development☆1,840Feb 28, 2024Updated last year
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,284Feb 1, 2026Updated last week
- RunPE implementation with multiple evasive techniques (1)☆381Sep 22, 2023Updated 2 years ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆747May 23, 2025Updated 8 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,470Jan 26, 2026Updated 2 weeks ago
- Performing Indirect Clean Syscalls☆603Apr 19, 2023Updated 2 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆123Jan 1, 2026Updated last month
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆407Sep 12, 2023Updated 2 years ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆282Jun 15, 2024Updated last year
- A modern 32/64-bit position independent implant template☆1,294Mar 21, 2025Updated 10 months ago
- Various methods of executing shellcode☆74Mar 27, 2023Updated 2 years ago
- Malware Development for Ethical Hackers, published by Packt☆442Jan 29, 2026Updated 2 weeks ago
- Pure Malware Development Resource Collections☆418Dec 29, 2024Updated last year
- Simulate the behavior of AV/EDR for malware development training.☆562Feb 15, 2024Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Nov 27, 2024Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆772Jan 26, 2026Updated 2 weeks ago
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆287Aug 1, 2025Updated 6 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,301Nov 12, 2025Updated 3 months ago
- EDR Lab for Experimentation Purposes☆1,409Jan 20, 2026Updated 3 weeks ago
- Threadless Process Injection using remote function hooking.☆808Sep 4, 2024Updated last year
- Analyse your malware to surgically obfuscate it☆517Dec 17, 2025Updated last month
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆202Mar 26, 2025Updated 10 months ago
- Evasive shellcode loader☆398Oct 17, 2024Updated last year
- Materials for the workshop "Red Team Ops: Havoc 101"☆396Oct 6, 2024Updated last year
- Collection of random RedTeam scripts.☆211Mar 8, 2024Updated last year
- Real fucking shellcode encryptor & obfuscator tool☆1,012Jan 7, 2026Updated last month
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,243Dec 11, 2023Updated 2 years ago
- Now You See Me, Now You Don't☆1,025Jan 23, 2026Updated 3 weeks ago
- ☆650Feb 6, 2026Updated last week
- HookChain: A new perspective for Bypassing EDR Solutions☆585Jan 5, 2025Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 5 months ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆757Jan 26, 2025Updated last year
- AV/EDR Lab environment setup references to help in Malware development☆424Feb 19, 2025Updated 11 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,142Mar 28, 2025Updated 10 months ago
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,438Oct 4, 2024Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆813Mar 28, 2025Updated 10 months ago