A curated list of tools and techniques written from experience in weaponization of malware
☆41Oct 26, 2023Updated 2 years ago
Alternatives and similar repositories for Malware_Weaponization
Users that are interested in Malware_Weaponization are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- List of possible Linux backdoors☆15Aug 7, 2020Updated 5 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆72Feb 11, 2024Updated 2 years ago
- ☆12Nov 12, 2023Updated 2 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Nov 24, 2019Updated 6 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- POC for frustrating/defeating Malware Analysts☆156Jun 12, 2022Updated 3 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Code dump from PEN-300/OSEP updated 2022☆43Aug 23, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 8 months ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Jul 22, 2021Updated 4 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Jun 2, 2016Updated 9 years ago
- Automating payload generation for OSEP labs and exam.☆34Jun 30, 2022Updated 3 years ago
- ☆12Mar 8, 2026Updated 2 weeks ago
- tmp files from tmp notes as tmp-pocs... ;)☆16Jun 3, 2022Updated 3 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)☆118Jun 7, 2023Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25May 19, 2022Updated 3 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆56Dec 30, 2019Updated 6 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Patching AmsiOpenSession by forcing an error branching☆154Aug 2, 2023Updated 2 years ago
- A Simple AES Command Line Crypter☆39Jan 19, 2023Updated 3 years ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆41Dec 12, 2025Updated 3 months ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆15Feb 16, 2021Updated 5 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆142Oct 28, 2021Updated 4 years ago
- The .NET equivalent of Window's rundll.exe/rundll32.exe☆11Oct 24, 2020Updated 5 years ago
- Offensive go lang series☆34May 2, 2020Updated 5 years ago