evilbuffer / malware-and-exploitdev-resourcesLinks
☆543Updated 3 years ago
Alternatives and similar repositories for malware-and-exploitdev-resources
Users that are interested in malware-and-exploitdev-resources are comparing it to the libraries listed below
Sorting:
- This is a repository of resource about Malware techniques☆802Updated 2 years ago
- Collection of resources that are made by the Malware Research community☆227Updated 2 years ago
- ☆1,050Updated last year
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆717Updated 10 months ago
- ☆724Updated 3 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆714Updated 5 months ago
- ☆186Updated last year
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆103Updated 2 years ago
- A workshop about Malware Development☆1,671Updated 2 years ago
- Collection of resources for my preparation to take the OSEE certification.☆279Updated 4 years ago
- ☆754Updated last year
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,903Updated last year
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆559Updated 11 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆669Updated last month
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆222Updated last year
- Resources for Windows exploit development☆1,591Updated 3 years ago
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆795Updated last year
- Red Team Cheatsheet in constant expansion.☆1,205Updated last year
- Awesome EDR Bypass Resources For Ethical Hacking☆1,224Updated 2 weeks ago
- A modern 32/64-bit position independent implant template☆1,227Updated 3 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,794Updated last year
- Malware development for red teaming workshop☆220Updated 3 years ago
- Different learning materials☆227Updated 3 months ago
- collection of apis used in malware development☆224Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆946Updated last year
- ☆307Updated 3 years ago
- Some notes and examples for cobalt strike's functionality☆1,091Updated 3 years ago
- EDR Lab for Experimentation Purposes☆1,276Updated last month
- Resources for learning about Exploit Development☆392Updated 4 years ago
- ☆1,668Updated 9 months ago