☆69Jul 26, 2021Updated 4 years ago
Alternatives and similar repositories for malware-and-exploitdev-resources
Users that are interested in malware-and-exploitdev-resources are comparing it to the libraries listed below
Sorting:
- Organized list of my malware development resources☆1,703May 16, 2022Updated 3 years ago
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated last month
- Programming course for Wannabes☆56Jan 26, 2025Updated last year
- Repositorio con recursos de valor para los participantes de la 3ra edición del Programa de Fundamentos de Ciberseguridad (2022).☆13Apr 16, 2022Updated 3 years ago
- A repository contains all sort of cheat-sheets for various things.☆11Sep 24, 2021Updated 4 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- Charter of the Open Network Infrastructure Association☆13Sep 9, 2017Updated 8 years ago
- A collection of my notes from various topics☆14May 26, 2022Updated 3 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- Collection of various malicious functionality to aid in malware development☆1,854Feb 28, 2024Updated 2 years ago
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆18Nov 27, 2017Updated 8 years ago
- ☆34Feb 9, 2018Updated 8 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆19Apr 12, 2020Updated 5 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Aug 4, 2021Updated 4 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆174May 11, 2023Updated 2 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Jun 28, 2022Updated 3 years ago
- Reverse Engineering and Debugging Malware☆31Feb 27, 2023Updated 3 years ago
- 🧞♂️ malware analysis☆40Mar 3, 2024Updated 2 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆44Mar 23, 2022Updated 3 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆51May 12, 2024Updated last year
- A simple polymorphic virus that changes its signature whenever it replicates☆12Aug 27, 2017Updated 8 years ago
- The repository contains the Malware Projects ---> Malicious Softwares as like RansomWare , Spyware etc developed my own while learning …☆17Jan 29, 2021Updated 5 years ago
- Testing POC for use cases☆25Nov 24, 2024Updated last year
- CMU Systems Programming course resources incl. course website, labs, schedule, & extra material. Books: "Computer Systems: A Programmer's…☆43Jul 18, 2023Updated 2 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆167Oct 5, 2022Updated 3 years ago
- Personal research and publication on malware families☆142Dec 28, 2024Updated last year
- ☆15Nov 22, 2023Updated 2 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- Resources for Windows exploit development☆1,652Dec 20, 2021Updated 4 years ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆155Mar 11, 2023Updated 3 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆19Mar 20, 2025Updated last year
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Jul 23, 2024Updated last year
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆25Jan 29, 2024Updated 2 years ago
- a map for the azure oriented pentests☆69Jul 3, 2023Updated 2 years ago