Fully undetectable malware with a backend written in Rust.
☆16Jun 27, 2022Updated 3 years ago
Alternatives and similar repositories for discoon-malware
Users that are interested in discoon-malware are comparing it to the libraries listed below
Sorting:
- Self-modifying malware in Rust☆29Sep 14, 2022Updated 3 years ago
- Multiplatform multithread efficient stream rust ransomware☆15May 18, 2022Updated 3 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- Java implementation of the Louvain method of community detection in graphs☆11Dec 19, 2025Updated 2 months ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- Triggers Windows Defender through a video sent on Discord.☆10Apr 3, 2021Updated 4 years ago
- My Linux profiles built for Volatility 2/3☆10Oct 11, 2025Updated 4 months ago
- RACF Database Parser☆12Apr 4, 2024Updated last year
- 🦎 Prototypes on polymorphic, metamorphic and poly-metamorphic malwares in Rust 🦎☆14Oct 8, 2023Updated 2 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- This is a simple python binding of Stag Fiducial Marker Detection System☆12Mar 7, 2022Updated 4 years ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 4 months ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- A version-agnostic ghidra plugin for de-compiling Qualcomm Hexagon QDSP6☆28Updated this week
- ☆15Oct 29, 2024Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago
- dcsync bof☆45Feb 13, 2026Updated 3 weeks ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Yet another haskell term rewriting library☆18Aug 27, 2025Updated 6 months ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- ☆15May 30, 2025Updated 9 months ago
- ☆13Jan 7, 2026Updated 2 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Cracking Passwords with Neural Networks☆11Nov 18, 2020Updated 5 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 8 months ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago