shownadda / Malware-Dev
☆55Updated this week
Related projects: ⓘ
- Weaponising C# - Fundamentals Training Content☆71Updated 3 years ago
- ☆82Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆64Updated 2 months ago
- Simple AV Evasion for PE Files☆40Updated 2 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- Red Team Operator: Malware Development Essentials Course☆92Updated 4 years ago
- ☆28Updated this week
- ☆38Updated last year
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆40Updated 4 years ago
- offensive notes & resources☆39Updated 2 months ago
- Bypassing AppLocker with C#☆136Updated 3 years ago
- ☆59Updated this week
- Random☆31Updated last year
- ☆117Updated last year
- A collection of PoCs for different injection techniques on Windows!☆41Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆32Updated 2 years ago
- Windows internals and exploitation tricks☆90Updated 3 months ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆45Updated 2 years ago
- Slide decks and/or materials from conference presentations☆55Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- IAT Unhooking proof-of-concept☆26Updated 5 months ago
- Shellcode generation and encoding utility☆21Updated 2 years ago
- ☆111Updated last year
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆43Updated 10 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated last year
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆116Updated 2 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- ☆46Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated last year
- A Python based ingestor for BloodHound☆81Updated last year