collection of blogs about malware development and analysis
☆74Dec 2, 2025Updated 3 months ago
Alternatives and similar repositories for mlwr_blogs
Users that are interested in mlwr_blogs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ProxyWatch☆46Feb 28, 2026Updated last month
- Commandline spoofing on Windows☆95Nov 25, 2025Updated 4 months ago
- Slides and resources from MCTTP 2025 Talk☆70Oct 26, 2025Updated 5 months ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆51Oct 28, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Simple web app to track OWASP WSTG security testing progress☆27Sep 12, 2025Updated 6 months ago
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 11 months ago
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 9 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Aug 13, 2024Updated last year
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆27Feb 4, 2026Updated last month
- The most bonkers FreeBSD image builder there is☆25Mar 19, 2026Updated last week
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Python tool to automatically perform SPN-less RBCD attacks.☆126Jan 7, 2026Updated 2 months ago
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Updated this week
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Aug 14, 2023Updated 2 years ago
- ☆16Aug 14, 2024Updated last year
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- ☆57Nov 18, 2025Updated 4 months ago
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆14Aug 7, 2023Updated 2 years ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 5 months ago
- ☆19Oct 25, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆13Aug 22, 2025Updated 7 months ago
- Usermode NT Explorer - Query kernel addresses, translate virtual to physical addresses, inspect the PFN database, and more.☆75Mar 16, 2026Updated last week
- VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advan…☆24Mar 16, 2025Updated last year
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆12Jun 7, 2021Updated 4 years ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 3 months ago
- Agent observability and replay tooling for AI safety & interpretability research.☆91Mar 19, 2026Updated last week
- ☆65Dec 19, 2024Updated last year
- Baka Mitai Meme generator using first order motion model☆13Oct 1, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A C# tool for extracting information from SCCM PXE boot media.☆52Jan 14, 2026Updated 2 months ago
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.☆135Nov 12, 2025Updated 4 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆134Dec 8, 2025Updated 3 months ago
- CurlWright is a Cloudflare bypass tool that leverages Playwright to execute curl commands with full browser capabilities, allowing you to…☆33Mar 9, 2026Updated 2 weeks ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 9 months ago
- Tiny and fast port scanner (Sliver edition)☆28Feb 17, 2026Updated last month
- Remote BOF Runner is a Havoc extension framework for remote execution of Beacon Object Files (BOFs) using a PIC loader made with Crystal …☆93Jan 2, 2026Updated 2 months ago