rootkit-io / awesome-malware-developmentLinks
Organized list of my malware development resources
☆1,602Updated 3 years ago
Alternatives and similar repositories for awesome-malware-development
Users that are interested in awesome-malware-development are comparing it to the libraries listed below
Sorting:
- A workshop about Malware Development☆1,700Updated 2 years ago
- ⚠️ malware development☆599Updated last year
- Collection of various malicious functionality to aid in malware development☆1,729Updated last year
- Research code & papers from members of vx-underground.☆1,288Updated 3 years ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆897Updated 4 years ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆741Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆2,899Updated 5 months ago
- This is a repository of resource about Malware techniques☆809Updated 2 years ago
- Resources for Windows exploit development☆1,607Updated 3 years ago
- Labs for Practical Malware Analysis & Triage☆1,007Updated 4 months ago
- Pure Malware Development Resource Collections☆359Updated 8 months ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,054Updated 4 years ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,273Updated 2 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,575Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆729Updated 7 months ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆668Updated last year
- 🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware thre…☆1,099Updated last year
- Resources for learning about Exploit Development☆402Updated 4 years ago
- Windows Local Privilege Escalation Cookbook☆1,166Updated 7 months ago
- Red Team Cheatsheet in constant expansion.☆1,226Updated last year
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,452Updated this week
- Offensive Software Exploitation Course☆2,376Updated 2 years ago
- ☆1,064Updated last year
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆654Updated last year
- Malware Development for Ethical Hackers, published by Packt☆364Updated 8 months ago
- ☆547Updated 3 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆728Updated 2 weeks ago
- Hardware/IOT Pentesting Wiki☆699Updated 3 weeks ago
- Some of my publicly available Malware analysis and Reverse engineering.☆823Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,805Updated last year