oomar400 / Malware-DevelopmentLinks
Write-ups and proof of concepts of design and implementaion of various modern malwares.
☆29Updated 2 years ago
Alternatives and similar repositories for Malware-Development
Users that are interested in Malware-Development are comparing it to the libraries listed below
Sorting:
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆138Updated 8 months ago
- ( 0day ) Local Privilege Escalation in IObit Malware Fighter☆164Updated 10 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆202Updated 2 years ago
- It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defend…☆281Updated last week
- A bunch of scripts and code i wrote.☆149Updated last year
- This repository implements Threadless Injection in C☆172Updated 2 years ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆232Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 9 months ago
- Reflective DLL Injection Made Bella☆248Updated last year
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆111Updated 7 months ago
- Remote Shellcode Injector☆221Updated 2 years ago
- ☆259Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Updated 3 years ago
- ☆164Updated 11 months ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆223Updated 2 years ago
- 「💀」Proof of concept on BYOVD attack☆165Updated last year
- Inject DLLs into the explorer process using icons☆400Updated 8 months ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆282Updated 4 months ago
- Sleep obfuscation☆264Updated last year
- Injecting DLL into LSASS at boot☆156Updated 9 months ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆185Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Updated 2 years ago
- My adventures in learning about different userland malware techniques, such as syscalls, injection, unhooking or sandbox evasion.☆79Updated 2 years ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆183Updated 2 years ago
- Basic interactive Windows kernel offensive toolkit written in C☆135Updated 4 months ago
- ☆107Updated 2 years ago
- RunPE implementation with multiple evasive techniques (1)☆379Updated 2 years ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆288Updated last year
- Generate an Alphabetical Polymorphic Shellcode☆135Updated 5 months ago