Organized list of my malware development resources
☆1,706Apr 1, 2026Updated last week
Alternatives and similar repositories for awesome-malware-development
Users that are interested in awesome-malware-development are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A workshop about Malware Development☆1,776Jun 2, 2023Updated 2 years ago
- Collection of various malicious functionality to aid in malware development☆1,868Feb 28, 2024Updated 2 years ago
- My collection of malware dev links☆313Feb 9, 2026Updated 2 months ago
- ☆69Jul 26, 2021Updated 4 years ago
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,295Feb 15, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ⚠️ malware development☆693May 27, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,183Mar 28, 2025Updated last year
- Research code & papers from members of vx-underground.☆1,365Dec 7, 2021Updated 4 years ago
- Golang malware development library☆977Dec 13, 2024Updated last year
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,375Mar 4, 2026Updated last month
- Rust Weaponization for Red Team Engagements.☆2,995Apr 25, 2024Updated last year
- Template-Driven AV/EDR Evasion Framework☆1,787Nov 3, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,376Oct 27, 2023Updated 2 years ago
- Win32 and Kernel abusing techniques for pentesters☆978Sep 3, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,953Sep 10, 2025Updated 7 months ago
- A modern 32/64-bit position independent implant template☆1,313Mar 21, 2025Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆764Jan 26, 2025Updated last year
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,610Jul 31, 2024Updated last year
- A curated list of awesome resources related to executable packing☆1,559Feb 14, 2026Updated last month
- ☆1,803Aug 30, 2024Updated last year
- Resources for Windows exploit development☆1,650Dec 20, 2021Updated 4 years ago
- The Havoc Framework☆8,266Dec 18, 2025Updated 3 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆751May 23, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,524Jul 8, 2025Updated 9 months ago
- Performing Indirect Clean Syscalls☆607Apr 19, 2023Updated 2 years ago
- Cobalt Strike UDRL for memory scanner evasion.☆1,009Jun 4, 2024Updated last year
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,473Aug 18, 2023Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks☆1,704Nov 11, 2022Updated 3 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆444Mar 31, 2026Updated last week
- collection of apis used in malware development☆231Aug 2, 2022Updated 3 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,879Aug 18, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆682Nov 9, 2023Updated 2 years ago
- Rusty Injection - Shellcode Reflective DLL Injection (sRDI) in Rust (Codename: Venom)☆362Mar 2, 2024Updated 2 years ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,507Jan 26, 2026Updated 2 months ago
- EDR Lab for Experimentation Purposes☆1,430Mar 1, 2026Updated last month
- ☆779Oct 17, 2023Updated 2 years ago
- Adversary Emulation Framework☆10,958Apr 2, 2026Updated last week
- game of active directory☆7,669Mar 12, 2026Updated 3 weeks ago