winsecurity / MaleficentVMLinks
This is practice VM for malware development
☆163Updated 2 weeks ago
Alternatives and similar repositories for MaleficentVM
Users that are interested in MaleficentVM are comparing it to the libraries listed below
Sorting:
- ☆154Updated 7 months ago
- ☆158Updated 5 months ago
- Vibe Malware Triage - MCP server for static PE analysis.☆73Updated last week
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆320Updated last week
- ☆146Updated 2 months ago
- The different ways to dump lsass☆200Updated 3 months ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆258Updated 2 months ago
- ☆71Updated 10 months ago
- Persist like a Dodder☆66Updated 6 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Updated 8 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆153Updated 3 months ago
- ☆164Updated 9 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆200Updated 2 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆87Updated 3 weeks ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆94Updated 8 months ago
- ☆108Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆117Updated 6 months ago
- Obex – Blocking unwanted DLLs in user mode☆268Updated 2 months ago
- Execute shellcode via ASPNET compiler☆58Updated 2 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆161Updated 4 months ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆91Updated 4 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆167Updated 10 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆97Updated 3 months ago
- Permanently disable EDRs as local admin☆121Updated last month
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆116Updated last month
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆33Updated 11 months ago
- Analyse MSI files for vulnerabilities☆138Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆135Updated 3 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆248Updated 7 months ago
- ☆163Updated last week