expl0itabl3 / MalDevSnippetsLinks
Code snippets for exploring malware techniques in C.
☆16Updated 2 years ago
Alternatives and similar repositories for MalDevSnippets
Users that are interested in MalDevSnippets are comparing it to the libraries listed below
Sorting:
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆90Updated 5 years ago
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆140Updated 2 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 3 years ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆86Updated 4 years ago
- ☆39Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Updated 3 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆60Updated last year
- ☆65Updated 3 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆101Updated 3 years ago
- Injects shellcode into remote processes using direct syscalls☆77Updated 5 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83Updated 2 years ago
- Various methods of executing shellcode☆73Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆71Updated last year
- From directory deletion to SYSTEM shell☆111Updated 5 years ago
- Piece of code to detect and remove hooks in IAT☆65Updated 3 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆65Updated 2 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆91Updated 2 years ago
- Crossplatform tool for inject shellcode into .exe and .dll binaries (x86 and x64)☆75Updated last month
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Updated 3 years ago
- Kernel Mode Driver for Elevating Process Privileges☆134Updated 2 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆71Updated 3 years ago
- ☆42Updated 4 years ago
- Windows internals and exploitation tricks☆112Updated 2 months ago
- ☆50Updated 3 years ago
- Identify and exploit leaked handles for local privilege escalation.☆111Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- DLL Hollowing PoC - Remote and Self shellcode injection☆85Updated 4 years ago