collection of blogs about malware development and analysis
☆73Dec 2, 2025Updated 4 months ago
Alternatives and similar repositories for mlwr_blogs
Users that are interested in mlwr_blogs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ProxyWatch☆48Updated this week
- Commandline spoofing on Windows☆101Nov 25, 2025Updated 4 months ago
- Slides and resources from MCTTP 2025 Talk☆70Oct 26, 2025Updated 5 months ago
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Analyze secretsdump output and hashcat potfiles to find shared passwords and weak credentials in Active Directory☆36Apr 4, 2026Updated 2 weeks ago
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆51Oct 28, 2025Updated 5 months ago
- Simple web app to track OWASP WSTG security testing progress☆28Sep 12, 2025Updated 7 months ago
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 11 months ago
- List of Mine Private wordlist i use for fuzzing☆91Feb 25, 2026Updated last month
- Elfina is a multi-architecture ELF loader written in Rust, supporting x86 and x86-64 binaries.☆46Mar 15, 2026Updated last month
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 9 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- System Call Integrity Layer - experimental security research☆25Apr 14, 2026Updated last week
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Python tool to automatically perform SPN-less RBCD attacks.☆128Jan 7, 2026Updated 3 months ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆21Mar 23, 2026Updated 3 weeks ago
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- ☆17Aug 14, 2024Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆36Feb 4, 2026Updated 2 months ago
- A practical client for ADWS in Golang.☆50Mar 3, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆57Nov 18, 2025Updated 5 months ago
- A web application testing tool built for capturing and modifying http/https requests.☆15Oct 15, 2025Updated 6 months ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆38Oct 9, 2025Updated 6 months ago
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆14Aug 7, 2023Updated 2 years ago
- ☆20Oct 25, 2024Updated last year
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- Monitor product price, inventory and popularity across vendors 🤖☆10Dec 9, 2022Updated 3 years ago
- Usermode NT Explorer - Query kernel addresses, translate virtual to physical addresses, inspect the PFN database, and more.☆76Mar 16, 2026Updated last month
- VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advan…☆24Mar 16, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆11Jun 7, 2021Updated 4 years ago
- ☆104Mar 18, 2026Updated last month
- ☆66Dec 19, 2024Updated last year
- A Dockerized build pipeline for custom Windows x64 shellcode☆53Dec 12, 2025Updated 4 months ago
- Baka Mitai Meme generator using first order motion model☆13Oct 1, 2020Updated 5 years ago
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆35Oct 28, 2025Updated 5 months ago
- A small .NET compression utility☆58Feb 2, 2022Updated 4 years ago