This is practice VM for malware development
☆180Nov 17, 2025Updated 5 months ago
Alternatives and similar repositories for MaleficentVM
Users that are interested in MaleficentVM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆156Apr 23, 2025Updated last year
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆45Aug 2, 2025Updated 9 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆219Mar 7, 2026Updated last month
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Repository focused on advanced Red Team tools and techniques, mainly created with C. It contains projects I have created to understand ma…☆20Mar 23, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆37Feb 4, 2026Updated 3 months ago
- ☆78Jan 1, 2026Updated 4 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆491Mar 15, 2026Updated last month
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆232Apr 28, 2026Updated last week
- ☆98Apr 14, 2026Updated 3 weeks ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆47Aug 30, 2023Updated 2 years ago
- Purple-team telemetry & simulation toolkit.☆113Dec 16, 2025Updated 4 months ago
- A hoontr must hoont☆107Nov 27, 2025Updated 5 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆41Oct 14, 2025Updated 6 months ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆86Jan 26, 2026Updated 3 months ago
- ☆59Dec 10, 2025Updated 4 months ago
- Covert data exfiltration via DNS☆53Feb 8, 2025Updated last year
- Go (formerly PowerShell) collector for adding MSSQL attack paths to BloodHound with OpenGraph☆317Apr 23, 2026Updated last week
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆122Nov 19, 2025Updated 5 months ago
- Detonate malware on VMs and get logs & detection status☆88Updated this week
- Abuse trust-boundaries to bypass firewalls and network controls☆417Jul 24, 2025Updated 9 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53May 31, 2018Updated 7 years ago
- Code for the Presentation "Bot-in-the-middle" at Le Hack 2023!☆15Oct 9, 2023Updated 2 years ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- proper ntdll .text section unhooking via native api. unlike other unhookers this doesnt leave 2 ntdlls loaded. x86/x64/wow64 supported.☆56Dec 9, 2025Updated 4 months ago
- ☆12Nov 21, 2023Updated 2 years ago
- Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems.☆672Oct 27, 2025Updated 6 months ago
- A command-line tool for interacting with HackMyVM, supporting machine listing, downloading, and flag submission with session persistence.☆17Jan 18, 2026Updated 3 months ago
- A portable C# utility for enumerating local and remote windows sessions☆57Jan 1, 2026Updated 4 months ago
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆75Mar 27, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆22Nov 19, 2025Updated 5 months ago
- PoC framework for Sliver compilation☆22Jan 14, 2025Updated last year
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆105Apr 4, 2026Updated last month
- Windows anti-forensics module☆25Apr 20, 2026Updated 2 weeks ago
- PDB file inspection tool☆135Nov 21, 2025Updated 5 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 5 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆56Apr 26, 2026Updated last week