Write-ups and proof of concepts of design and implementaion of various modern malwares.
☆29Feb 22, 2023Updated 3 years ago
Alternatives and similar repositories for Malware-Development
Users that are interested in Malware-Development are comparing it to the libraries listed below
Sorting:
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated last month
- ☆21Jul 4, 2022Updated 3 years ago
- Malware Libraries focused in help Malware Development☆25Mar 20, 2023Updated 2 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆26Jul 26, 2024Updated last year
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- .NET assembly loader with patching AMSI and ETW bypass☆31Apr 16, 2025Updated 11 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.☆69Nov 15, 2025Updated 4 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆139May 22, 2025Updated 9 months ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 5 months ago
- Malware Development Framework☆11Apr 13, 2024Updated last year
- IDA Python scripts☆42Apr 11, 2025Updated 11 months ago
- A mainstream audio & video player service that puts accessibility first —☆13Aug 12, 2024Updated last year
- Quick analysis focusing on most important of a Malware or a Threat☆38Sep 4, 2023Updated 2 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆32Sep 22, 2025Updated 5 months ago
- Help red teams find opsec processes during engagements☆42Dec 7, 2024Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 8 months ago
- Intel Bluetooth Drivers for macOS☆10Aug 10, 2022Updated 3 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- ☆14May 14, 2022Updated 3 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- A collection of malware samples.☆39Dec 5, 2017Updated 8 years ago
- Sliver agent rewritten in C++☆49Sep 4, 2024Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 9 months ago
- Discord bot using the cryptography toolkit of SkeletonKey☆12Nov 18, 2024Updated last year
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- My Awesome List☆12Updated this week
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 3 months ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆11Nov 6, 2022Updated 3 years ago
- ☆10May 18, 2022Updated 3 years ago
- A comprehensive guide to becoming a hacker, covering skills, tools, and best practices to master cybersecurity and hacking techniques.☆16May 22, 2025Updated 9 months ago
- All my POC related to malware development☆15Feb 19, 2026Updated 3 weeks ago