oomar400 / Malware-Development
Write-ups and proof of concepts of design and implementaion of various modern malwares.
☆25Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Malware-Development
- A bunch of scripts and code i wrote.☆130Updated this week
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader☆84Updated 7 months ago
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆154Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆173Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆69Updated 8 months ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆214Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆122Updated 5 months ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆164Updated 9 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆84Updated last year
- Bypass Malware Sandbox Evasion Ram check☆134Updated last year
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆240Updated 5 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆40Updated 8 months ago
- Recursive Loader☆102Updated last month
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆119Updated last week
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆168Updated 10 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆75Updated last week
- This repository implements Threadless Injection in C☆153Updated 10 months ago
- ☆118Updated last year
- Proof of concept code for thread pool based process injection in Windows.☆104Updated last month
- random code snippets, useful for getting started☆111Updated 3 weeks ago
- Reflective DLL Injection Made Bella☆197Updated 3 weeks ago
- Windows Kernel Offensive Toolset☆113Updated 2 months ago
- Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote m…☆165Updated last year
- Shellcode obfuscation tool to avoid AV/EDR.☆107Updated last year
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆43Updated 6 months ago
- PE obfuscator with Evasion in mind☆210Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆58Updated 2 weeks ago
- Malware?☆69Updated last month