winsecurity / MaleficentVMLinks
This is practice VM for malware development
☆106Updated last week
Alternatives and similar repositories for MaleficentVM
Users that are interested in MaleficentVM are comparing it to the libraries listed below
Sorting:
- ☆154Updated 6 months ago
- ☆71Updated 9 months ago
- ☆157Updated 5 months ago
- Vibe Malware Triage - MCP server for static PE analysis.☆72Updated 5 months ago
- ☆164Updated 8 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆111Updated 5 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆32Updated 10 months ago
- ☆108Updated last year
- The different ways to dump lsass☆195Updated 3 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Updated 8 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆294Updated last week
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆116Updated last week
- Utilities for obfuscating shellcode☆94Updated last month
- ☆145Updated last month
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆117Updated last year
- Comprehensive Windows Syscall Extraction & Analysis Framework☆150Updated 2 months ago
- Bypass user-land hooks by syscall tampering via the Trap Flag☆131Updated 2 months ago
- Obex – Blocking unwanted DLLs in user mode☆262Updated last month
- ☆105Updated last year
- Permanently disable EDRs as local admin☆121Updated last month
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆85Updated last week
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 8 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆162Updated 9 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆183Updated last month
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- ☆24Updated 8 months ago
- Analyse MSI files for vulnerabilities☆138Updated last year
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆159Updated 3 months ago
- Persist like a Dodder☆66Updated 5 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆61Updated 2 months ago