☆69Jul 26, 2021Updated 4 years ago
Alternatives and similar repositories for malware-and-exploitdev-resources
Users that are interested in malware-and-exploitdev-resources are comparing it to the libraries listed below
Sorting:
- Organized list of my malware development resources☆1,700May 16, 2022Updated 3 years ago
- my reading list for reverse engineering malware & exploit development☆15Feb 3, 2026Updated 3 weeks ago
- CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection☆23Apr 8, 2024Updated last year
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- Programming course for Wannabes☆56Jan 26, 2025Updated last year
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- A repository contains all sort of cheat-sheets for various things.☆11Sep 24, 2021Updated 4 years ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- A simple polymorphic virus that changes its signature whenever it replicates☆12Aug 27, 2017Updated 8 years ago
- Reverse Engineering and Debugging Malware☆32Feb 27, 2023Updated 3 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 3 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Charter of the Open Network Infrastructure Association☆13Sep 9, 2017Updated 8 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- ☆34Feb 9, 2018Updated 8 years ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 5 months ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Jun 28, 2022Updated 3 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- Testing POC for use cases☆25Nov 24, 2024Updated last year
- The repository contains the Malware Projects ---> Malicious Softwares as like RansomWare , Spyware etc developed my own while learning …☆17Jan 29, 2021Updated 5 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Mar 23, 2022Updated 3 years ago
- 🧞♂️ malware analysis☆38Mar 3, 2024Updated last year
- CMU Systems Programming course resources incl. course website, labs, schedule, & extra material. Books: "Computer Systems: A Programmer's…☆43Jul 18, 2023Updated 2 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 3 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 10 months ago
- Some examples of anti debug techniques used in malware or commercial products preventing analysts to debug code of app.☆22Apr 18, 2020Updated 5 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆50May 12, 2024Updated last year
- ☆26Apr 10, 2023Updated 2 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆20Apr 12, 2020Updated 5 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆25Jan 29, 2024Updated 2 years ago
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆51Feb 2, 2026Updated 3 weeks ago
- A collection of techniques commonly used in malware to accomplish core tasks.☆83Jun 15, 2019Updated 6 years ago
- A workshop about Malware Development☆1,764Jun 2, 2023Updated 2 years ago
- ☆24May 24, 2022Updated 3 years ago
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- This is a collection of Worms for educational purposes☆34Jul 17, 2025Updated 7 months ago
- 🗺 A map of OSINT tools.☆19Jul 5, 2023Updated 2 years ago