☆69Jul 26, 2021Updated 4 years ago
Alternatives and similar repositories for malware-and-exploitdev-resources
Users that are interested in malware-and-exploitdev-resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Organized list of my malware development resources☆1,718Apr 1, 2026Updated last month
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated 2 months ago
- Programming course for Wannabes☆56Jan 26, 2025Updated last year
- This is a very detailed Binary exploitation roadmap starting from the very first vulnerability to the latest , each one with its mitigati…☆22Dec 5, 2023Updated 2 years ago
- A repository contains all sort of cheat-sheets for various things.☆11Sep 24, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of my notes from various topics☆14May 26, 2022Updated 3 years ago
- Charter of the Open Network Infrastructure Association☆13Sep 9, 2017Updated 8 years ago
- CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection☆23Apr 8, 2024Updated 2 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆18Nov 27, 2017Updated 8 years ago
- Collection of various malicious functionality to aid in malware development☆1,879Feb 28, 2024Updated 2 years ago
- ☆35Feb 9, 2018Updated 8 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆19Apr 12, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆144Aug 4, 2021Updated 4 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆179May 11, 2023Updated 2 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Jun 28, 2022Updated 3 years ago
- A collection of techniques commonly used in malware to accomplish core tasks.☆83Jun 15, 2019Updated 6 years ago
- 🧞♂️ malware analysis☆40Mar 3, 2024Updated 2 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆52May 12, 2024Updated last year
- A simple polymorphic virus that changes its signature whenever it replicates☆12Aug 27, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The repository contains the Malware Projects ---> Malicious Softwares as like RansomWare , Spyware etc developed my own while learning …☆17Jan 29, 2021Updated 5 years ago
- CMU Systems Programming course resources incl. course website, labs, schedule, & extra material. Books: "Computer Systems: A Programmer's…☆45Jul 18, 2023Updated 2 years ago
- Testing POC for use cases☆26Nov 24, 2024Updated last year
- Personal research and publication on malware families☆142Dec 28, 2024Updated last year
- ☆15Nov 22, 2023Updated 2 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- Resources for Windows exploit development☆1,652Dec 20, 2021Updated 4 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆155Mar 11, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆22Mar 20, 2025Updated last year
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆26Jan 29, 2024Updated 2 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆46Jul 23, 2024Updated last year
- Binary Ninja plugin for restoring function names from stripped Golang binaries☆14Oct 19, 2020Updated 5 years ago
- a map for the azure oriented pentests☆70Jul 3, 2023Updated 2 years ago
- A network scanner to output in various adblock formats☆28Updated this week