georgesotiriadis / MalwareDevLinks
☆84Updated 3 years ago
Alternatives and similar repositories for MalwareDev
Users that are interested in MalwareDev are comparing it to the libraries listed below
Sorting:
- ☆121Updated last year
- ☆38Updated 2 years ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- ☆107Updated 2 years ago
- POC for frustrating/defeating Malware Analysts☆157Updated 3 years ago
- A C2 framework built for my bachelors thesis☆54Updated 3 weeks ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆96Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 3 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆115Updated 2 years ago
- Do some DLL SideLoading magic☆89Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- ☆84Updated last year
- Command and Control (C2) framework☆132Updated 7 months ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- ☆139Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated 2 years ago
- Just some random Red Team Scripts that can be useful☆153Updated last year
- Encodes a payload within a generated mock-CSS file☆59Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆56Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆183Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 6 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆87Updated 3 weeks ago
- ☆132Updated 2 years ago
- An open-source process injection enumeration tool written in C#☆174Updated 3 years ago
- 「💀」Proof of concept on BYOVD attack☆165Updated last year
- ☆25Updated 2 years ago
- A Repository to Track Anti-Forensic Techniques☆117Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆108Updated 8 months ago