Code and notes regarding Malware Development
☆11Oct 30, 2022Updated 3 years ago
Alternatives and similar repositories for MalwareDevelopment
Users that are interested in MalwareDevelopment are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- ⚠️ Collection of malicious file ⚠️☆13May 5, 2021Updated 4 years ago
- A Collection of Android Malware☆19Feb 19, 2019Updated 7 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Apr 20, 2026Updated 2 weeks ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Malware Development Framework☆11Apr 13, 2024Updated 2 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- A personal filterlist for blocking trackers/ads/malware/antiadblock/adware/data-mining and all other unacceptable/unwarranted network re…☆11Oct 4, 2022Updated 3 years ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Feb 22, 2023Updated 3 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆20Mar 4, 2022Updated 4 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆11Jun 14, 2019Updated 6 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆24Aug 10, 2020Updated 5 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Shellcode loader with evasion capabilities written in Nim☆16Jan 25, 2025Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆53Aug 18, 2023Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- ☆20Dec 16, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated 3 months ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆15Dec 10, 2019Updated 6 years ago
- Easy recon tool for OSCP and HTB☆10Aug 8, 2024Updated last year
- Comprehensive Protection Against Deepfakes, Deepnudes & Harmful Content☆20Jan 3, 2026Updated 4 months ago
- The USB Rubber Ducky is a discrete miniature keyboard that is disguised as a regular USB Storage Device. This page provides the payload …☆16Apr 21, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆20Jul 16, 2024Updated last year
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Oct 1, 2021Updated 4 years ago