Code snippets for bare-metal malware development
☆99Feb 19, 2022Updated 4 years ago
Alternatives and similar repositories for BMJ
Users that are interested in BMJ are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- Classic Bofa adapted to CobaltStrike.☆11Oct 4, 2022Updated 3 years ago
- ☆689Mar 25, 2025Updated last year
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆29Sep 11, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 4 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- One gate to all syscalls!☆23Mar 12, 2022Updated 4 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆13Aug 8, 2023Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆54Sep 4, 2021Updated 4 years ago
- ☆29Aug 10, 2019Updated 6 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42May 9, 2019Updated 7 years ago
- encrypted-linux-kernel-modules☆13Nov 4, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Mar 10, 2023Updated 3 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆23Oct 6, 2021Updated 4 years ago
- Probably the first ELF binary infector ever created in Nim.☆28Jun 23, 2020Updated 5 years ago
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago
- ☆17Mar 25, 2019Updated 7 years ago
- Beacon Object Files.☆36Feb 26, 2024Updated 2 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Jul 27, 2021Updated 4 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Proof-of-concept LLVM fork to speculatively inline objc_msgSend☆16Dec 11, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆22Jul 24, 2022Updated 3 years ago
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 3 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆95Nov 5, 2021Updated 4 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 3 years ago
- this is Crytolocket Malware Domain Generation Algorithm (DGA). Cryptolocker uses DGA to generate 1000 to 10000 unique domain names for it…☆14Sep 5, 2016Updated 9 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- An unsorted collection of little tools and scripts I've made that don't fit anywhere else☆19Jul 15, 2022Updated 3 years ago
- Initial Commit of Coresploit☆57Oct 12, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Local OXID Resolver (LCLOR) : Research and Tooling☆37May 19, 2021Updated 5 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 5 years ago
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆267Dec 6, 2025Updated 5 months ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆111Apr 8, 2020Updated 6 years ago
- yet another hidden LKM hunter☆33Sep 18, 2025Updated 8 months ago
- ROP-Gadget finder in Rust☆18Feb 2, 2018Updated 8 years ago