vxunderground / VXUG-Papers
Research code & papers from members of vx-underground.
☆1,197Updated 3 years ago
Alternatives and similar repositories for VXUG-Papers:
Users that are interested in VXUG-Papers are comparing it to the libraries listed below
- Collection of various malicious functionality to aid in malware development☆1,617Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,085Updated 3 years ago
- Organized list of my malware development resources☆1,514Updated 2 years ago
- AV/EDR evasion via direct system calls.☆1,852Updated 2 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,131Updated last month
- Resources for Windows exploit development☆1,566Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆2,417Updated last year
- ☆2,062Updated 2 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,533Updated last year
- Open-Source Shellcode & PE Packer☆1,925Updated last year
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆1,915Updated 2 weeks ago
- This program is designed to demonstrate various process injection techniques☆1,126Updated last year
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,481Updated 3 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,260Updated 2 weeks ago
- Some of my publicly available Malware analysis and Reverse engineering.☆804Updated 9 months ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆3,820Updated 5 months ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,110Updated 4 months ago
- The Hunt for Malicious Strings☆1,179Updated 2 years ago
- A tool to kill antimalware protected processes☆1,422Updated 3 years ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆830Updated 4 years ago
- Writing custom backdoor payloads with C# - Defcon 27 Workshop☆1,135Updated 3 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,586Updated 2 years ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆1,863Updated 4 months ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,889Updated 3 weeks ago
- Template-Driven AV/EDR Evasion Framework☆1,651Updated last year
- A modern 32/64-bit position independent implant template☆1,175Updated last week
- Red Teaming Tactics and Techniques☆4,208Updated 7 months ago
- Golang malware development library☆950Updated 3 months ago
- ☆1,618Updated 7 months ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,520Updated 4 years ago