rootkit-io / awesome-malware-development
Organized list of my malware development resources
☆1,471Updated 2 years ago
Alternatives and similar repositories for awesome-malware-development:
Users that are interested in awesome-malware-development are comparing it to the libraries listed below
- A workshop about Malware Development☆1,614Updated last year
- Resources for Windows exploit development☆1,553Updated 3 years ago
- Collection of various malicious functionality to aid in malware development☆1,561Updated 11 months ago
- ⚠️ malware development☆491Updated 8 months ago
- Research code & papers from members of vx-underground.☆1,178Updated 3 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,502Updated last year
- Labs for Practical Malware Analysis & Triage☆913Updated 3 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,603Updated 2 months ago
- Offensive Software Exploitation Course☆2,351Updated last year
- This is a repository of resource about Malware techniques☆781Updated last year
- Resources for learning about Exploit Development☆377Updated 4 years ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆797Updated 3 years ago
- Projects for security students☆2,361Updated 4 months ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆603Updated 5 months ago
- OSWE, OSEP, OSED, OSEE☆2,712Updated 7 months ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆671Updated this week
- Awesome EDR Bypass Resources For Ethical Hacking☆1,062Updated last week
- ☆1,021Updated 8 months ago
- Red Teaming & Pentesting checklists for various engagements☆2,521Updated 5 months ago
- Windows Local Privilege Escalation Cookbook☆1,034Updated last week
- Cybersecurity oriented awesome list☆1,594Updated this week
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆646Updated last year
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆1,933Updated 2 years ago
- ☆535Updated 2 years ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆619Updated 6 months ago
- Leaked pentesting manuals given to Conti ransomware crooks☆962Updated 3 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,752Updated 8 months ago
- Red Teaming Tactics and Techniques☆4,131Updated 5 months ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,319Updated last month
- ☆416Updated 2 years ago