This is practice VM for malware development
☆180Nov 17, 2025Updated 4 months ago
Alternatives and similar repositories for MaleficentVM
Users that are interested in MaleficentVM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆156Apr 23, 2025Updated 11 months ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆37Aug 2, 2025Updated 7 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆212Mar 7, 2026Updated 2 weeks ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆27Feb 4, 2026Updated last month
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Updated this week
- ☆76Jan 1, 2026Updated 2 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆475Mar 15, 2026Updated last week
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆205Dec 20, 2025Updated 3 months ago
- ☆96Aug 3, 2025Updated 7 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 5 months ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 5 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆295Mar 13, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆84Jan 26, 2026Updated last month
- ☆59Dec 10, 2025Updated 3 months ago
- Covert data exfiltration via DNS☆51Feb 8, 2025Updated last year
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆117Nov 19, 2025Updated 4 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆119Jan 25, 2026Updated 2 months ago
- Detonate malware on VMs and get logs & detection status☆89Mar 17, 2026Updated last week
- proper ntdll .text section unhooking via native api. unlike other unhookers this doesnt leave 2 ntdlls loaded. x86/x64/wow64 supported.☆53Dec 9, 2025Updated 3 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆410Jul 24, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53May 31, 2018Updated 7 years ago
- Code for the Presentation "Bot-in-the-middle" at Le Hack 2023!☆16Oct 9, 2023Updated 2 years ago
- Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.☆642Oct 27, 2025Updated 4 months ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- A command-line tool for interacting with HackMyVM, supporting machine listing, downloading, and flag submission with session persistence.☆17Jan 18, 2026Updated 2 months ago
- ☆12Nov 21, 2023Updated 2 years ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 2 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- PoC framework for Sliver compilation☆22Jan 14, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PDB file inspection tool☆133Nov 21, 2025Updated 4 months ago
- Hardened your Windows OS against forensics analysis☆25Nov 27, 2024Updated last year
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆225Mar 13, 2026Updated last week
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 4 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- A hoontr must hoont☆106Nov 27, 2025Updated 3 months ago
- ☆10Mar 18, 2026Updated last week