Statistics for topic malware-development
RepositoryStats tracks 663,734 Github repositories, of these 84 are tagged with the malware-development topic. The most common primary language for repositories using this topic is C++ (22). Other languages include: Python (12), C (11)
Stargazers over time for topic malware-development
Most starred repositories for topic malware-development (view more)
Trending repositories for topic malware-development (view more)
This repository contains complete resources and coding practices for malware development using Rust 🦀.
A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Callback Routine registering and ZwTerminateProcess.
Collection of malware source code for a variety of platforms in an array of different programming languages.
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabiliti...
RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust 🦀
A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Callback Routine registering and ZwTerminateProcess.
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabiliti...
This repository contains complete resources and coding practices for malware development using Rust 🦀.
A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Callback Routine registering and ZwTerminateProcess.
This repository contains complete resources and coding practices for malware development using Rust 🦀.
A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Callback Routine registering and ZwTerminateProcess.
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabiliti...
Collection of malware source code for a variety of platforms in an array of different programming languages.
Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries
A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Callback Routine registering and ZwTerminateProcess.
This repository contains complete resources and coding practices for malware development using Rust 🦀.
Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries
A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Callback Routine registering and ZwTerminateProcess.
Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries
This repository contains complete resources and coding practices for malware development using Rust 🦀.
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabiliti...
Collection of malware source code for a variety of platforms in an array of different programming languages.
Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries
A user-mode code and its rootkit that will Kill EDR Processes permanently by leveraging the power of Process Creation Blocking Kernel Callback Routine registering and ZwTerminateProcess.
LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabiliti...
Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.
Collection of malware source code for a variety of platforms in an array of different programming languages.
This repository contains complete resources and coding practices for malware development using Rust 🦀.
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabiliti...
RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust 🦀
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabiliti...
Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging