collection of blogs about malware development and analysis
☆74Dec 2, 2025Updated 5 months ago
Alternatives and similar repositories for mlwr_blogs
Users that are interested in mlwr_blogs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ProxyWatch☆49Apr 25, 2026Updated 2 weeks ago
- Commandline spoofing on Windows☆101Nov 25, 2025Updated 5 months ago
- Slides and resources from MCTTP 2025 Talk☆70Oct 26, 2025Updated 6 months ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Simple web app to track OWASP WSTG security testing progress☆28Sep 12, 2025Updated 7 months ago
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆51Oct 28, 2025Updated 6 months ago
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated last year
- Analyze secretsdump output and hashcat potfiles to find shared passwords and weak credentials in Active Directory☆37Apr 4, 2026Updated last month
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆119Apr 22, 2026Updated 2 weeks ago
- Elfina is a multi-architecture ELF loader written in Rust, supporting x86 and x86-64 binaries.☆46Mar 15, 2026Updated last month
- List of Mine Private wordlist i use for fuzzing☆93Feb 25, 2026Updated 2 months ago
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 10 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 4 months ago
- The most bonkers FreeBSD image builder there is☆26May 2, 2026Updated last week
- System Call Integrity Layer - experimental security research☆26Apr 14, 2026Updated 3 weeks ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Python tool to automatically perform SPN-less RBCD attacks.☆128Jan 7, 2026Updated 4 months ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Mar 23, 2026Updated last month
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- A practical client for ADWS in Golang.☆51Mar 3, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆18Aug 14, 2024Updated last year
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆39Feb 4, 2026Updated 3 months ago
- ☆57Nov 18, 2025Updated 5 months ago
- A web application testing tool built for capturing and modifying http/https requests.☆15Oct 15, 2025Updated 6 months ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆38Oct 9, 2025Updated 7 months ago
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆13Aug 7, 2023Updated 2 years ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆13Aug 22, 2025Updated 8 months ago
- ☆20Oct 25, 2024Updated last year
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Usermode NT Explorer - Query kernel addresses, translate virtual to physical addresses, inspect the PFN database, and more.☆83Mar 16, 2026Updated last month
- VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advan…☆24Mar 16, 2025Updated last year
- ☆68Dec 19, 2024Updated last year
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 4 months ago
- Baka Mitai Meme generator using first order motion model☆13Oct 1, 2020Updated 5 years ago
- Unofficial BrickSeek API☆12Jul 2, 2017Updated 8 years ago
- A C# tool for extracting information from SCCM PXE boot media.☆53Jan 14, 2026Updated 3 months ago