Pequeña guia que hice sobre el desarrollo de malware y tecnicas que son usadas
☆29Feb 18, 2025Updated last year
Alternatives and similar repositories for Guia-MalDev
Users that are interested in Guia-MalDev are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NazunaRansom, ransomware inspirado en mi waifu☆12Mar 24, 2024Updated 2 years ago
- HTTP based framework for building command and control components for remote access trojans☆15Aug 2, 2021Updated 4 years ago
- Una colección de whallpapers de monas chinas para mis escritorios☆13Aug 7, 2021Updated 4 years ago
- My collection of desktop wallpapers☆24Jun 12, 2021Updated 4 years ago
- ☆23Dec 11, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Keylogger hecho en python, donde recoge las pulsaciones del teclado y mediante sockets lo envía a una máquina atacante por el puerto 8080…☆33Dec 21, 2023Updated 2 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- Generador Automatico de Shell Inversa☆26Oct 18, 2023Updated 2 years ago
- ☆17Oct 19, 2016Updated 9 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- Aplicación web Tipo Marketplace, registro de usuarios, post y compras de usuarios y vendedores desarrollada con Django y Tailwind☆11Sep 21, 2022Updated 3 years ago
- Creador de un link iplogger☆13Sep 29, 2023Updated 2 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Bash script that perform all the setup for BSPWM installation, including polybar, picom, pywal,nvchad, with multiple color schemes and a …☆38Jan 19, 2026Updated 2 months ago
- ☆10Oct 1, 2023Updated 2 years ago
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Sep 8, 2021Updated 4 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆11May 4, 2023Updated 2 years ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago
- Andromeda Software HVNC☆13Apr 3, 2024Updated last year
- C++ keylogger to save all the keys pressed into a local txt file☆11Apr 6, 2023Updated 2 years ago
- ICMP隧道,用于内网渗透工具☆10Mar 13, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A set of vulnerable machines rendered by Packer and Ansible scripts.☆13Feb 15, 2021Updated 5 years ago
- Wallpapers of varied styles in a beautiful app☆54Apr 21, 2025Updated 11 months ago
- ☆46Sep 24, 2025Updated 6 months ago
- Windows Internals 7th book but free (PDF)☆19Dec 3, 2024Updated last year
- This script dynamically decodes and executes a Base64 encoded Mimikatz script, allowing users to bypass security measures and run specifi…☆21Jul 9, 2024Updated last year
- Implementing AES 256 CBC in AES-NI - MASM Format☆19Aug 9, 2025Updated 7 months ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 2 years ago
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆26Nov 26, 2025Updated 4 months ago
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆34Sep 21, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆15Oct 9, 2021Updated 4 years ago
- Let's try to create a rootkit!☆19Mar 6, 2020Updated 6 years ago
- ☆13Dec 7, 2022Updated 3 years ago
- ☆14Jul 21, 2024Updated last year
- ☆27Jan 5, 2023Updated 3 years ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆16Jul 16, 2024Updated last year