zet235 / black-hat-cpp
C++ Programming for Hackers
☆40Updated 3 months ago
Alternatives and similar repositories for black-hat-cpp:
Users that are interested in black-hat-cpp are comparing it to the libraries listed below
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆39Updated 3 weeks ago
- A comprehensive Hypervisor resources repo☆105Updated 2 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆218Updated this week
- Centralized resource for listing and organizing known injection techniques and POCs☆245Updated 5 months ago
- ☆39Updated last month
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆52Updated 6 months ago
- Programming course for Wannabes☆42Updated 2 months ago
- 🧞♂️ malware analysis☆35Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆66Updated 5 months ago
- Windows rootkit designed to work with BYOVD exploits☆178Updated 2 months ago
- random code snippets, useful for getting started☆120Updated 4 months ago
- Windows Kernel Mode Rootkit☆51Updated last month
- Pure Malware Development Resource Collections☆261Updated 3 months ago
- Cybersecurity blog. Red Team, pentest, malware analysis and dev☆70Updated last week
- Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.☆91Updated 4 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆73Updated last month
- Awesome Privilege Escalation☆101Updated 2 years ago
- ☆347Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆117Updated 2 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆152Updated last month
- My collection of malware dev links☆264Updated 7 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆211Updated 5 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆371Updated 4 months ago
- ☆66Updated 2 months ago
- Reflective DLL Injection Made Bella☆225Updated 3 months ago
- ☆65Updated 3 years ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆27Updated 2 years ago
- ☆35Updated 11 months ago
- 「💀」Proof of concept on BYOVD attack☆157Updated 4 months ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago