leetCipher / Malware.development
Malware attacks/techniques explained
☆120Updated last month
Alternatives and similar repositories for Malware.development:
Users that are interested in Malware.development are comparing it to the libraries listed below
- Malware Development for Ethical Hackers, published by Packt☆305Updated 4 months ago
- ⚠️ malware development☆530Updated 10 months ago
- ☆120Updated last year
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆176Updated last month
- What the name says....☆93Updated 7 months ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆155Updated 6 months ago
- Pure Malware Development Resource Collections☆265Updated 3 months ago
- notes and ramblings from my OSCP/PenTesting Studies☆81Updated last year
- Scripts for offensive security☆111Updated last month
- This is for Ethical Use only.☆314Updated 2 weeks ago
- 🧞♂️ malware analysis☆36Updated last year
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆140Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆99Updated last year
- E-locks: A blockchain-based voting system E-locks is a robust voting system implemented in C++ and OpenCV, leveraging blockchain technolo…☆14Updated 9 months ago
- Embed a payload inside a PNG file☆306Updated 5 months ago
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆414Updated last month
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆157Updated last year
- Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in vario…☆28Updated 2 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆76Updated 2 years ago
- EDR & Antivirus Bypass to Gain Shell Access☆236Updated 6 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆153Updated last month
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆309Updated this week
- My collection of malware dev links☆262Updated 7 months ago
- CVE-2024-21413 PoC for THM Lab☆83Updated last year
- Repo containing cracked red teaming tools.☆163Updated last month
- ☆449Updated this week
- Generate FUD backdoors☆245Updated 2 years ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆655Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆33Updated 9 months ago
- Koth - TryHackMe Tricks☆164Updated last year