Write-ups and proof of concepts of design and implementaion of various modern malwares.
☆29Feb 22, 2023Updated 3 years ago
Alternatives and similar repositories for Malware-Development
Users that are interested in Malware-Development are comparing it to the libraries listed below
Sorting:
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- Enumerate Callbacks and all Object Types☆16Jan 9, 2023Updated 3 years ago
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆26Jul 26, 2024Updated last year
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated last month
- .NET assembly loader with patching AMSI and ETW bypass☆31Apr 16, 2025Updated 11 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- ☆10Oct 11, 2020Updated 5 years ago
- ☆21Jul 4, 2022Updated 3 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆140May 22, 2025Updated 9 months ago
- ☆37Feb 11, 2023Updated 3 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.☆69Nov 15, 2025Updated 4 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Malware Libraries focused in help Malware Development☆25Mar 20, 2023Updated 2 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 4 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆17Jun 3, 2022Updated 3 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆21Nov 5, 2023Updated 2 years ago
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆46Mar 5, 2026Updated 2 weeks ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- 驱动开发工具包☆11Dec 8, 2018Updated 7 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆67Mar 27, 2023Updated 2 years ago
- Linux BPF plugins for Volatility3☆23Jan 19, 2024Updated 2 years ago
- .NET assembly loader with patchless AMSI and ETW bypass in Rust☆58Oct 9, 2024Updated last year
- ☆120May 26, 2025Updated 9 months ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 7 months ago
- Hijacking valid driver services to load arbitrary (signed) drivers abusing native symbolic links and NT paths☆361Aug 11, 2024Updated last year
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆67Dec 29, 2023Updated 2 years ago
- Bypassing antivirus detection: old-school malware, new tricks☆67May 10, 2023Updated 2 years ago
- IDA Python scripts☆42Apr 11, 2025Updated 11 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Nov 20, 2020Updated 5 years ago