Code and notes regarding Malware Development
☆11Oct 30, 2022Updated 3 years ago
Alternatives and similar repositories for MalwareDevelopment
Users that are interested in MalwareDevelopment are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- ⚠️ Collection of malicious file ⚠️☆13May 5, 2021Updated 4 years ago
- A Collection of Android Malware☆18Feb 19, 2019Updated 7 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Apr 4, 2026Updated last week
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Malware Development Framework☆11Apr 13, 2024Updated 2 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- A personal filterlist for blocking trackers/ads/malware/antiadblock/adware/data-mining and all other unacceptable/unwarranted network re…☆11Oct 4, 2022Updated 3 years ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Feb 22, 2023Updated 3 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 4 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆11Jun 14, 2019Updated 6 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆24Aug 10, 2020Updated 5 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Shellcode loader with evasion capabilities written in Nim☆16Jan 25, 2025Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆53Aug 18, 2023Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- ☆21Dec 16, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated 2 months ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- Easy recon tool for OSCP and HTB☆10Aug 8, 2024Updated last year
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆15Dec 10, 2019Updated 6 years ago
- Comprehensive Protection Against Deepfakes, Deepnudes & Harmful Content☆20Jan 3, 2026Updated 3 months ago
- The USB Rubber Ducky is a discrete miniature keyboard that is disguised as a regular USB Storage Device. This page provides the payload …☆16Apr 21, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆20Jul 16, 2024Updated last year
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator …☆15Jan 14, 2019Updated 7 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Oct 1, 2021Updated 4 years ago