Write-ups and proof of concepts of design and implementaion of various modern malwares.
☆29Feb 22, 2023Updated 3 years ago
Alternatives and similar repositories for Malware-Development
Users that are interested in Malware-Development are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 6 months ago
- Enumerate Callbacks and all Object Types☆16Jan 9, 2023Updated 3 years ago
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆26Jul 26, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated 2 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- ☆10Oct 11, 2020Updated 5 years ago
- ☆21Jul 4, 2022Updated 3 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20May 22, 2025Updated 10 months ago
- ☆37Feb 11, 2023Updated 3 years ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆155May 22, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Request device ticket/token using the device's MSA☆37Aug 25, 2025Updated 7 months ago
- ☆16Jun 16, 2021Updated 4 years ago
- Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.☆71Mar 24, 2026Updated 2 weeks ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Malware Libraries focused in help Malware Development☆25Mar 20, 2023Updated 3 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 4 years ago
- Windows Internals Book 7th edition Tools☆17Apr 26, 2020Updated 5 years ago
- 'Hacking' a 7-Eleven Bluetooth Smart Cup | Meme?☆25Oct 30, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆21Nov 5, 2023Updated 2 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆67Mar 27, 2023Updated 3 years ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass in Rust☆58Oct 9, 2024Updated last year
- Linux BPF plugins for Volatility3☆23Jan 19, 2024Updated 2 years ago
- ☆120May 26, 2025Updated 10 months ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆16Aug 8, 2025Updated 8 months ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆361Aug 11, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆67Dec 29, 2023Updated 2 years ago
- Bypassing antivirus detection: old-school malware, new tricks☆67May 10, 2023Updated 2 years ago
- ☆21Dec 16, 2024Updated last year
- IDA Python scripts☆42Apr 11, 2025Updated 11 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- ☆27Feb 3, 2026Updated 2 months ago
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it☆16Jun 13, 2025Updated 9 months ago