☆38Mar 3, 2025Updated last year
Alternatives and similar repositories for malware-research
Users that are interested in malware-research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆49Apr 2, 2025Updated last year
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- ☆27Nov 26, 2024Updated last year
- miscellaneous codes☆38Sep 24, 2023Updated 2 years ago
- Just another .data pointer hook. This time it's hooking AfdIrpCallDispatch within Afd.sys☆12Feb 22, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 10 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Aug 4, 2023Updated 2 years ago
- ☆24Jul 15, 2023Updated 2 years ago
- I present to you AsyncRAT improved version with a STUB which does not bug and which is undetectable via windows defender normally. I invi…☆16Sep 13, 2022Updated 3 years ago
- This driver hooks a device object for ioctl and uses mdls to allocate physical pages and manually injects an entry into a process's page …☆16Feb 14, 2023Updated 3 years ago
- Find accounts using common and default passwords in Active Directory.☆71Sep 19, 2019Updated 6 years ago
- A simple AES malware crypter☆16Mar 16, 2018Updated 8 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- AES-NI bruteforcer for bad Character Sets☆10Jan 17, 2021Updated 5 years ago
- Sources Codes of many Office Malwares☆18Sep 4, 2022Updated 3 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- Source files for my posts☆17Jun 20, 2023Updated 2 years ago
- ☆16Sep 12, 2021Updated 4 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- A strings decryptor for Phoenix Protector using the stack thanks to https://github.com/MindSystemm/StackYenoDeobfuscator.☆10Jun 8, 2020Updated 5 years ago
- Cyberark secrets provider for k8s☆31Apr 14, 2026Updated 2 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆82Jun 21, 2025Updated 10 months ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated last month
- CyberArk Conjur command line interface written in Python☆18Sep 9, 2024Updated last year
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- ☆29Aug 3, 2024Updated last year
- ☆24May 21, 2021Updated 4 years ago
- Decoder for VMProtect hwids☆18Aug 1, 2022Updated 3 years ago
- Activate Any DVDFab Product.☆13Aug 3, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115May 21, 2023Updated 2 years ago
- Personal research and publication on malware families☆142Dec 28, 2024Updated last year
- Demos and presentation from SECArmy Village Grayhat 2020☆37Mar 15, 2023Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Nov 17, 2019Updated 6 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆39Feb 18, 2023Updated 3 years ago