georgesotiriadis / MalwareDevLinks
☆84Updated 3 years ago
Alternatives and similar repositories for MalwareDev
Users that are interested in MalwareDev are comparing it to the libraries listed below
Sorting:
- ☆120Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- ☆107Updated 2 years ago
- A C2 framework built for my bachelors thesis☆56Updated 10 months ago
- POC for frustrating/defeating Malware Analysts☆156Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago
- ☆38Updated 2 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆95Updated 3 months ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- ☆41Updated last year
- Command and Control (C2) framework☆131Updated 3 months ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆61Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- Do some DLL SideLoading magic☆86Updated last year
- Just some random Red Team Scripts that can be useful☆154Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆102Updated 3 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆110Updated last year
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆95Updated 2 years ago
- Collection of random RedTeam scripts.☆208Updated last year
- ☆134Updated 2 years ago
- 「💀」Proof of concept on BYOVD attack☆164Updated 9 months ago
- ☆27Updated 2 years ago
- A Rust-based dropper for shellcode payloads.☆68Updated 5 months ago
- ☆82Updated 9 months ago
- Bypass Malware Time Delays☆103Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆179Updated last year
- Red Team Operation's Defense Evasion Technique.☆55Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated 2 months ago
- ☆136Updated 2 years ago
- ☆166Updated 2 years ago