kymb0 / Malware_learnsLinks
☆132Updated last year
Alternatives and similar repositories for Malware_learns
Users that are interested in Malware_learns are comparing it to the libraries listed below
Sorting:
- ☆85Updated 2 years ago
- Source code of exploiting windows API for red teaming series☆148Updated 2 years ago
- WTSRM☆211Updated 2 years ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆82Updated 3 years ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆133Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆205Updated 2 years ago
- My collection of malware dev links☆268Updated 9 months ago
- ☆67Updated 3 years ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆229Updated 5 months ago
- Beacon Object File Loader☆287Updated last year
- ☆119Updated last year
- Native Syscalls Shellcode Injector☆266Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆187Updated last year
- ☆113Updated 3 years ago
- Patch AMSI and ETW☆239Updated last year
- ☆354Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆260Updated 11 months ago
- miscellaneous scripts and programs☆243Updated 4 months ago
- Detect strange memory regions and DLLs☆183Updated 3 years ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆167Updated last year
- EDRSandblast-GodFault☆265Updated last year
- ☆257Updated last year
- ☆304Updated last year
- Exploitation of process killer drivers☆201Updated last year
- Run Your Payload Without Running Your Payload☆182Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆378Updated 10 months ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆296Updated last year
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆308Updated 9 months ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆358Updated 2 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆217Updated 3 years ago