oomar400 / Malware-DevelopmentLinks
Write-ups and proof of concepts of design and implementaion of various modern malwares.
☆28Updated 2 years ago
Alternatives and similar repositories for Malware-Development
Users that are interested in Malware-Development are comparing it to the libraries listed below
Sorting:
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆69Updated last month
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆118Updated last month
- Malicious powershell scripts loader designed to avoid detection.☆50Updated 2 years ago
- ☆85Updated 2 years ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆164Updated 3 months ago
- A bunch of scripts and code i wrote.☆141Updated 7 months ago
- ☆133Updated 3 months ago
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- Do some DLL SideLoading magic☆84Updated last year
- ☆39Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆197Updated last year
- A shellcode injection tool showcasing various process injection techniques☆137Updated last year
- Reflective DLL Injection Made Bella☆228Updated 5 months ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆170Updated 2 years ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆161Updated last year
- Bypass LSA protection using the BYODLL technique☆164Updated 9 months ago
- Patching AmsiOpenSession by forcing an error branching☆146Updated last year
- execute PE in memory Filelessly☆43Updated 4 months ago
- A collection of Cobalt Strike Aggressor scripts.☆98Updated 3 years ago
- Generate Shellcode Loaders & Injects☆156Updated 2 years ago
- ☆177Updated 10 months ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆31Updated 2 years ago
- The best powershell obfuscator ever made☆109Updated 2 months ago
- Create Anti-Copy DRM Malware☆58Updated 10 months ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆226Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆53Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆180Updated last year