Statistics for topic malware-development
RepositoryStats tracks 584,796 Github repositories, of these 68 are tagged with the malware-development topic. The most common primary language for repositories using this topic is C++ (16). Other languages include: Python (12)
Stargazers over time for topic malware-development
Most starred repositories for topic malware-development (view more)
Trending repositories for topic malware-development (view more)
Collection of malware source code for a variety of platforms in an array of different programming languages.
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in this exciting journey and add your expertise to our collective eff...
Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in this exciting journey and add your expertise to our collective eff...
micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.
Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)
Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.
ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.
Collection of malware source code for a variety of platforms in an array of different programming languages.
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.
Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in this exciting journey and add your expertise to our collective eff...
Collection of malware source code for a variety of platforms in an array of different programming languages.
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.
Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
Some POCs for my BYOVD research and find some vulnerable drivers
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
Collection of malware source code for a variety of platforms in an array of different programming languages.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)
Unorthodox and stealthy way to inject a DLL into the explorer using icons