m4ul3r / malwareLinks
malware written for educational purposes
☆66Updated 8 months ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- Indirect syscalls + DInvoke made simple.☆92Updated 6 months ago
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆82Updated last year
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆30Updated last year
- PoC XLL builder in Python/Nim☆46Updated 2 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆51Updated last year
- Threadless shellcode injection tool☆66Updated 11 months ago
- ☆42Updated 2 years ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆30Updated 2 weeks ago
- A process injection technique using only thread context manipulation☆38Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆50Updated 6 months ago
- ☆47Updated 2 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆53Updated 3 months ago
- ShellcodeFluctuation PoC ported to Nim☆77Updated 2 years ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆63Updated last year
- Section-based payload obfuscation technique for x64☆61Updated 11 months ago
- ☆51Updated last month
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆61Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50Updated last year
- slides for talk given during uscg 2023 combine☆37Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆77Updated 4 months ago
- Cortex EDR Ransomware protection Bypass☆24Updated 5 months ago
- A nim port of C5pider's Ekko project.☆18Updated 2 years ago
- Impersonate Tokens using only NTAPI functions☆77Updated 3 months ago
- Sniffing files generator☆59Updated 4 months ago
- Lateral Movement via the .NET Profiler☆82Updated 7 months ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆34Updated 3 months ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Rewrite to fit my needs☆28Updated 11 months ago
- Proxy function calls through the thread pool with ease☆28Updated 4 months ago
- Sample Rust Hooking Engine☆36Updated last year