β91Apr 10, 2024Updated 2 years ago
Alternatives and similar repositories for malware-course-public
Users that are interested in malware-course-public are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- β21Jan 28, 2022Updated 4 years ago
- π‘οΈ A multi-user malleable C2 framework targeting Windows. Written in C++ and Pythonβ45Feb 6, 2026Updated 3 months ago
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-compβ¦β24Mar 7, 2025Updated last year
- OSED Practice binaryβ26Nov 23, 2023Updated 2 years ago
- Logging tool intended for red team usageβ38Dec 5, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Neuviks Terraform Red Team Workshopβ14Aug 10, 2025Updated 8 months ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clipβ¦β39Apr 12, 2016Updated 10 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flowβ17Sep 10, 2024Updated last year
- collection of pentesting and network security documentsβ21Jun 1, 2022Updated 3 years ago
- β18Jun 10, 2025Updated 10 months ago
- Easily-guessable Password Generator for Password Spray Attackβ20Jun 4, 2020Updated 5 years ago
- β10Feb 9, 2022Updated 4 years ago
- β39Oct 12, 2022Updated 3 years ago
- string encryption in Nimβ19Jun 15, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Stupid Simple Detection Testingβ13Mar 7, 2024Updated 2 years ago
- Process hunting Toolkit is toolkit capable of hunting down malicious processes on Windowsβ14Jan 31, 2025Updated last year
- Generate passwords and analyze their strength given physical limits to computationβ21Feb 25, 2023Updated 3 years ago
- β49May 12, 2021Updated 4 years ago
- PowerShell script to bypass UAC using DCCWβ19Jul 29, 2017Updated 8 years ago
- Windows Post-Exploitation tools wrapperβ12Jun 24, 2024Updated last year
- i made this simple lite version of dsplit.exe to detect antivirus signature matchingβ15Nov 6, 2013Updated 12 years ago
- BSim signatures and databases for Ghidra to recover function symbols withβ15Jul 11, 2024Updated last year
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other thaβ¦β19Apr 30, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Mythic C2 wrapper for NimSyscallPackerβ25Mar 12, 2025Updated last year
- Patched GDB-Multiarch to debug android Kernels.β14Jun 29, 2019Updated 6 years ago
- Source Code of MSIL Ransomβ14Feb 11, 2023Updated 3 years ago
- β38Sep 28, 2023Updated 2 years ago
- A simple rpc2socks alternative in pure Go.β31Jul 8, 2024Updated last year
- BasicLDR: A Reflective DLL Loaderβ14Jun 11, 2024Updated last year
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.β18Jan 3, 2026Updated 4 months ago
- Extension functionality for the NightHawk operator clientβ27Nov 3, 2023Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.β50Jul 10, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- β12Sep 10, 2025Updated 7 months ago
- Sleep obfuscation for shellcode implants and their reflective shitβ55Sep 19, 2023Updated 2 years ago
- β36Jan 23, 2025Updated last year
- Project Repository. Replication code.β26Jan 6, 2025Updated last year
- miscellaneous scripts and programsβ281Jan 23, 2025Updated last year
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contrβ¦β12Jun 3, 2021Updated 4 years ago
- Simple .NET assembly to interact with services.β43Sep 27, 2019Updated 6 years ago