evilbuffer / malware-and-exploitdev-resources
☆506Updated 2 years ago
Alternatives and similar repositories for malware-and-exploitdev-resources:
Users that are interested in malware-and-exploitdev-resources are comparing it to the libraries listed below
- This is a repository of resource about Malware techniques☆777Updated last year
- ☆1,019Updated 7 months ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆596Updated 4 months ago
- Collection of resources that are made by the Malware Research community☆219Updated last year
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆511Updated 6 months ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆667Updated this week
- A modern 64-bit position independent implant template☆1,093Updated 7 months ago
- ☆739Updated last year
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆781Updated 9 months ago
- A workshop about Malware Development☆1,608Updated last year
- ☆712Updated 2 years ago
- Resources for Windows exploit development☆1,552Updated 3 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆207Updated last year
- collection of apis used in malware development☆224Updated 2 years ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆614Updated 6 months ago
- ☆412Updated 2 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,428Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆699Updated 5 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,040Updated this week
- ☆182Updated 11 months ago
- Malware development for red teaming workshop☆214Updated 3 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆729Updated 3 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,752Updated 7 months ago
- Tools & Interesting Things for RedTeam Ops☆2,165Updated 2 years ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆646Updated 11 months ago
- A not so awesome list of malware gems for aspiring malware analysts☆800Updated last year
- Leaked pentesting manuals given to Conti ransomware crooks☆961Updated 3 years ago
- Red Team Cheatsheet in constant expansion.☆1,149Updated last year