oomar400 / Malware-DevelopmentLinks
Write-ups and proof of concepts of design and implementaion of various modern malwares.
☆29Updated 2 years ago
Alternatives and similar repositories for Malware-Development
Users that are interested in Malware-Development are comparing it to the libraries listed below
Sorting:
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆230Updated 2 years ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆132Updated 5 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆102Updated 4 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆159Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆139Updated 2 years ago
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆260Updated 3 weeks ago
- ( 0day ) Local Privilege Escalation in IObit Malware Fighter☆157Updated 6 months ago
- Reflective DLL Injection Made Bella☆239Updated 9 months ago
- My collection of malware dev links☆294Updated 4 months ago
- ☆261Updated last year
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆213Updated last year
- A bunch of scripts and code i wrote.☆144Updated 11 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆287Updated last year
- ☆161Updated 7 months ago
- 「💀」Proof of concept on BYOVD attack☆164Updated 10 months ago
- APT38 Tactic PoC for Stealing 0days from security researchers☆319Updated 4 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆234Updated 11 months ago
- ☆369Updated 2 years ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆180Updated last year
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆96Updated 4 months ago
- ☆41Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆388Updated last year
- Remote Shellcode Injector☆220Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆85Updated 6 months ago
- All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming☆231Updated last year
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆197Updated last year
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆139Updated 9 months ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆177Updated 2 years ago