Statistics for topic malware-development
RepositoryStats tracks 595,856 Github repositories, of these 67 are tagged with the malware-development topic. The most common primary language for repositories using this topic is C++ (15). Other languages include: Python (12)
Stargazers over time for topic malware-development
Most starred repositories for topic malware-development (view more)
Trending repositories for topic malware-development (view more)
Collection of malware source code for a variety of platforms in an array of different programming languages.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can help you out in building your own malware and payloads :D
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can help you out in building your own malware and payloads :D
Collection of malware source code for a variety of platforms in an array of different programming languages.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Organized list of my malware development resources
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Python programs & tools built in the Ethical Hacking with Python EBook
Some POCs for my BYOVD research and find some vulnerable drivers
Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in this exciting journey and add your expertise to our collective eff...
Collection of malware source code for a variety of platforms in an array of different programming languages.
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.
Some POCs for my BYOVD research and find some vulnerable drivers
My new malware database, the old one is now archived and all my new malwares will be uploaded here instead. As always, this is made for educational purposes only, I'm not responsible for any damages
A collection of offensive Go packages inspired by different Go repositories.
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
Collection of malware source code for a variety of platforms in an array of different programming languages.
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)
Unorthodox and stealthy way to inject a DLL into the explorer using icons