oomar400 / Malware-DevelopmentLinks
Write-ups and proof of concepts of design and implementaion of various modern malwares.
☆29Updated 2 years ago
Alternatives and similar repositories for Malware-Development
Users that are interested in Malware-Development are comparing it to the libraries listed below
Sorting:
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆132Updated 3 months ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆229Updated 2 years ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆207Updated last year
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆255Updated 10 months ago
- ☆161Updated 6 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆288Updated last year
- ☆260Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆193Updated last year
- C++ self-Injecting dropper based on various EDR evasion techniques.☆390Updated last year
- My collection of malware dev links☆284Updated 3 months ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆150Updated 5 months ago
- This repository implements Threadless Injection in C☆172Updated last year
- Remote Shellcode Injector☆219Updated 2 years ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆180Updated last year
- Bypass Malware Sandbox Evasion Ram check☆138Updated 2 years ago
- kernel callback removal (Bypassing EDR Detections)☆188Updated 5 months ago
- ☆362Updated last year
- Injecting DLL into LSASS at boot☆137Updated 4 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆155Updated 2 years ago
- A bunch of scripts and code i wrote.☆144Updated 10 months ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆180Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆179Updated last year
- A .NET malware loader, using API-Hashing to evade static analysis☆208Updated 2 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆97Updated 3 months ago
- 「💀」Proof of concept on BYOVD attack☆164Updated 9 months ago
- APT38 Tactic PoC for Stealing 0days from security researchers☆317Updated 3 months ago
- Use hardware breakpoint to dynamically change SSN in run-time☆267Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆231Updated 10 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆80Updated 4 months ago
- Execute shellcode files with rundll32☆208Updated last year