winsecurity / MaleficentVMLinks
This is practice VM for malware development
☆179Updated 2 months ago
Alternatives and similar repositories for MaleficentVM
Users that are interested in MaleficentVM are comparing it to the libraries listed below
Sorting:
- ☆156Updated 9 months ago
- ☆72Updated last year
- Vibe Malware Triage - MCP server for static PE analysis.☆74Updated 2 months ago
- ☆163Updated 7 months ago
- The different ways to dump lsass☆261Updated 5 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 4 months ago
- Persist like a Dodder☆67Updated 8 months ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆220Updated last month
- ☆164Updated 11 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Updated 10 months ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆120Updated 3 months ago
- ☆154Updated 4 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆44Updated 9 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Updated 11 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆36Updated last year
- ☆20Updated 3 weeks ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆47Updated 4 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Updated 3 weeks ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆166Updated 6 months ago
- Execute shellcode via ASPNET compiler☆60Updated 4 months ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆121Updated 5 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆58Updated 2 months ago
- ☆108Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Enumerate active EDR's on the system☆150Updated 4 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆92Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 11 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆165Updated 6 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆168Updated last year