rad9800 / PMDLinks
☆157Updated 8 months ago
Alternatives and similar repositories for PMD
Users that are interested in PMD are comparing it to the libraries listed below
Sorting:
- This is practice VM for malware development☆174Updated last month
- ☆161Updated 6 months ago
- ☆164Updated 10 months ago
- ☆72Updated 11 months ago
- The different ways to dump lsass☆203Updated 4 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Updated 9 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- ☆152Updated 3 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆123Updated last week
- Persist like a Dodder☆66Updated 7 months ago
- Tools for analyzing EDR agents☆273Updated last year
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆121Updated 2 months ago
- Vibe Malware Triage - MCP server for static PE analysis.☆73Updated last month
- Evade EDR's the simple way, by not touching any of the API's they hook.☆169Updated 11 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆207Updated last year
- Direct access to NTFS volumes☆293Updated 4 months ago
- RunPE implementation with multiple evasive techniques (2)☆262Updated 3 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆164Updated 5 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆160Updated 4 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆165Updated 5 months ago
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆202Updated 9 months ago
- A Mythic Agent written in PIC C.☆207Updated 11 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆262Updated 7 months ago
- Source code for complete MALicious softWARE books I & II☆64Updated 2 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆107Updated 4 months ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆65Updated last year
- ☆24Updated 10 months ago
- Group Policy Objects manipulation and exploitation framework☆283Updated last month
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆261Updated 3 months ago
- AppLocker-Based EDR Neutralization☆238Updated 2 weeks ago