kymb0 / Malware_learns
☆132Updated last year
Alternatives and similar repositories for Malware_learns:
Users that are interested in Malware_learns are comparing it to the libraries listed below
- WTSRM☆210Updated 2 years ago
- ☆85Updated 2 years ago
- miscellaneous scripts and programs☆242Updated 3 months ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆377Updated 9 months ago
- Source code of exploiting windows API for red teaming series☆148Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆205Updated 2 years ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆133Updated 2 years ago
- ☆300Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆338Updated 2 months ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆82Updated 3 years ago
- ☆113Updated 2 years ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆258Updated 10 months ago
- Performing Indirect Clean Syscalls☆541Updated 2 years ago
- POC for frustrating/defeating Malware Analysts☆154Updated 2 years ago
- ☆119Updated last year
- ☆351Updated last year
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆365Updated 2 years ago
- EDRSandblast-GodFault☆261Updated last year
- ☆72Updated last year
- Beacon Object File Loader☆286Updated last year
- Native Syscalls Shellcode Injector☆266Updated last year
- My collection of malware dev links☆265Updated 8 months ago
- Patch AMSI and ETW☆237Updated last year
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆229Updated 4 months ago
- Run Your Payload Without Running Your Payload☆181Updated 2 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆257Updated 2 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆247Updated last year
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆190Updated 2 years ago
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆436Updated last year
- Patching AmsiOpenSession by forcing an error branching☆145Updated last year