Code snippets for exploring malware techniques in C.
☆16May 27, 2023Updated 2 years ago
Alternatives and similar repositories for MalDevSnippets
Users that are interested in MalDevSnippets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DllInject (Memory Load)☆11Jan 5, 2019Updated 7 years ago
- PowerShell script that decrypts password entries from a Passwordstate server.☆26Feb 17, 2026Updated last month
- Files related to PoC||GTFO 21:21 - NSA’s Backdoor of the PX1000-Cr☆17Mar 23, 2022Updated 4 years ago
- CVE-2025-32463 Proof of concept☆24Jul 1, 2025Updated 9 months ago
- windows rpc 使用MIDL+RPC实现HelloWorld☆23Mar 21, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- OWASP Foundation Web Respository for VulnerableApp project. Project's codebase Repository: https://github.com/SasanLabs/VulnerableApp☆13Updated this week
- BOF and C++ implementation of the Windows Defender sandboxing technique described by Elastic Security Labs/Gabriel Landau.☆25Jul 5, 2023Updated 2 years ago
- ☆12Apr 28, 2025Updated 11 months ago
- Code used in this post https://captmeelo.com/redteam/maldev/2022/04/21/kernelcallbacktable-injection.html☆146Apr 21, 2022Updated 3 years ago
- Exfiltrate data from a compromised target using covert channels☆17Mar 20, 2021Updated 5 years ago
- Adobe Air runtime under docker☆11Aug 17, 2016Updated 9 years ago
- EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It…☆27Sep 6, 2025Updated 7 months ago
- kb=$(cat sillynotes.txt)☆48Mar 24, 2026Updated 2 weeks ago
- A simple framework to build tools to blast spyware with noisy data☆13Feb 7, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A minimal (~720b) size-optimized UI framework☆13Jul 30, 2023Updated 2 years ago
- C API for http://ipify.org☆19Jul 20, 2022Updated 3 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆66Jan 17, 2018Updated 8 years ago
- A graphical user interface for managing systemd services on Linux systems☆11May 23, 2024Updated last year
- OWASP Foundation Web Repository☆13Oct 9, 2025Updated 6 months ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- A suite of cybersecurity applications used in Brazilian Army Cyber Security course to accelerate and automate processes. Some tools have …☆22Feb 23, 2025Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆24Feb 9, 2024Updated 2 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- in-process powershell runner for BRC4☆48Oct 31, 2023Updated 2 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- ☆20Mar 13, 2018Updated 8 years ago
- Ad hoc collection of Red Teaming & Active Directory tooling.☆229Aug 3, 2023Updated 2 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- It decompiles target apk and adds security exception to accept all certificates thus making able to work with Burp/Charles and Other Tool…☆18Nov 22, 2020Updated 5 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Aug 13, 2024Updated last year
- ☆45Mar 7, 2025Updated last year
- Site oficial da LibreCode http://librecode.coop☆16Mar 9, 2026Updated last month
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- 应急响应辅助工具,根据样本hash 全盘检索☆12Sep 10, 2021Updated 4 years ago