zet235 / black-hat-cppLinks
C++ Programming for Hackers
☆63Updated this week
Alternatives and similar repositories for black-hat-cpp
Users that are interested in black-hat-cpp are comparing it to the libraries listed below
Sorting:
- ☆69Updated 4 years ago
- Cybersecurity blog. Red Team, pentest, malware analysis and dev☆98Updated this week
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆213Updated 6 months ago
- 🧞♂️ malware analysis☆38Updated last year
- My collection of malware dev links☆308Updated last week
- Collection of codes focused on Linux rootkits☆195Updated 3 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆290Updated last week
- A reverse shell for Windows and Linux written in C.☆86Updated 3 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆113Updated 3 years ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆177Updated 6 months ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆757Updated last year
- RunPE implementation with multiple evasive techniques (1)☆379Updated 2 years ago
- A collection of offensive Go packages inspired by different Go repositories.☆254Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆68Updated 2 months ago
- ☆135Updated 2 years ago
- Programming course for Wannabes☆56Updated last year
- Awesome Privilege Escalation☆144Updated 3 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- ☆57Updated last year
- Pure Malware Development Resource Collections☆418Updated last year
- It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defend…☆281Updated last week
- [ARCHIVED] Early work on Benthic (Windows Kernel Rootkit).☆58Updated 5 months ago
- The best resources for learning exploit development☆123Updated 6 years ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆432Updated 8 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆166Updated 2 years ago
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆13Updated 2 years ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆318Updated this week
- Centralized resource for listing and organizing known injection techniques and POCs☆673Updated last week
- Repo for malware development practices I post on my blog☆35Updated last year
- Malware Development for Ethical Hackers, published by Packt☆438Updated last week