Write-ups and proof of concepts of design and implementaion of various modern malwares.
☆28Feb 22, 2023Updated 3 years ago
Alternatives and similar repositories for Malware-Development
Users that are interested in Malware-Development are comparing it to the libraries listed below
Sorting:
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- Enumerate Callbacks and all Object Types☆16Jan 9, 2023Updated 3 years ago
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- ☆20Jul 4, 2022Updated 3 years ago
- Malware Libraries focused in help Malware Development☆25Mar 20, 2023Updated 2 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆25Jul 26, 2024Updated last year
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆10Jan 4, 2025Updated last year
- Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.☆68Nov 15, 2025Updated 3 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆138May 22, 2025Updated 9 months ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- Malware Development Framework☆11Apr 13, 2024Updated last year
- Reverse Engineering and Debugging Malware☆32Feb 27, 2023Updated 2 years ago
- IDA Python scripts☆42Apr 11, 2025Updated 10 months ago
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 7 months ago
- A mainstream audio & video player service that puts accessibility first —☆13Aug 12, 2024Updated last year
- Quick analysis focusing on most important of a Malware or a Threat☆38Sep 4, 2023Updated 2 years ago
- ☆14May 14, 2022Updated 3 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 5 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 2 months ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- GNTL Project Documentation☆11Apr 9, 2021Updated 4 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- Help red teams find opsec processes during engagements☆42Dec 7, 2024Updated last year
- A collection of malware samples.☆39Dec 5, 2017Updated 8 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Jul 13, 2021Updated 4 years ago
- Sliver agent rewritten in C++☆49Sep 4, 2024Updated last year
- A library to edit Apple IPSW files.☆11Oct 10, 2023Updated 2 years ago
- ☆10Mar 24, 2023Updated 2 years ago
- ☆10May 27, 2021Updated 4 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- 基于upx的SM4加密壳☆10May 12, 2023Updated 2 years ago
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Jan 28, 2021Updated 5 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- A BOF to create a scheduled task using a COM object.☆16Dec 3, 2024Updated last year
- A library that enables dynamically rebinding symbols in Mach-O binaries running on iOS.☆12Jan 25, 2025Updated last year
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago