☆69Jul 26, 2021Updated 4 years ago
Alternatives and similar repositories for malware-and-exploitdev-resources
Users that are interested in malware-and-exploitdev-resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Curated resources for malware analysis, reverse engineering, and defensive security research.☆1,726Apr 1, 2026Updated last month
- Repositorio con recursos de valor para los participantes de la 3ra edición del Programa de Fundamentos de Ciberseguridad (2022).☆13Apr 16, 2022Updated 4 years ago
- This is a very detailed Binary exploitation roadmap starting from the very first vulnerability to the latest , each one with its mitigati…☆22Dec 5, 2023Updated 2 years ago
- Exploitation and Mitigation Slides☆136Jun 4, 2024Updated last year
- Charter of the Open Network Infrastructure Association☆13Sep 9, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection☆23Apr 8, 2024Updated 2 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Jan 4, 2024Updated 2 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- Collection of various malicious functionality to aid in malware development☆1,891Feb 28, 2024Updated 2 years ago
- ☆36Feb 9, 2018Updated 8 years ago
- Attack and introduction (info stealer), start your adventure in MMD☆20Sep 14, 2025Updated 8 months ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆19Apr 12, 2020Updated 6 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 6 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆144Aug 4, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 🧞♂️ malware analysis☆40Mar 3, 2024Updated 2 years ago
- DLL Injection to Exe with Assembly using OllyDbg☆25Oct 28, 2017Updated 8 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆52May 12, 2024Updated 2 years ago
- ☆12Sep 10, 2022Updated 3 years ago
- A simple polymorphic virus that changes its signature whenever it replicates☆12Aug 27, 2017Updated 8 years ago
- The repository contains the Malware Projects ---> Malicious Softwares as like RansomWare , Spyware etc developed my own while learning …☆17Jan 29, 2021Updated 5 years ago
- CMU Systems Programming course resources incl. course website, labs, schedule, & extra material. Books: "Computer Systems: A Programmer's…☆46Jul 18, 2023Updated 2 years ago
- Testing POC for use cases☆26Nov 24, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆170Oct 5, 2022Updated 3 years ago
- Personal research and publication on malware families☆142Dec 28, 2024Updated last year
- Easy peasy file uploads☆35May 12, 2026Updated last week
- Resources for Windows exploit development☆1,654Dec 20, 2021Updated 4 years ago
- Hackaton - El Poder de la Nube☆12Dec 11, 2022Updated 3 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆155Mar 11, 2023Updated 3 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆26Jan 29, 2024Updated 2 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆46Jul 23, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Binary Ninja plugin for restoring function names from stripped Golang binaries☆14Oct 19, 2020Updated 5 years ago
- a map for the azure oriented pentests☆70Jul 3, 2023Updated 2 years ago
- A network scanner to output in various adblock formats☆28Updated this week
- x86 and x64 assembly "read-eval-print loop" for Windows☆36Aug 13, 2017Updated 8 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,113May 27, 2022Updated 3 years ago
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Sep 28, 2025Updated 7 months ago
- ☆45Apr 27, 2024Updated 2 years ago