Trending repositories for topic malware-development
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
Organized list of my malware development resources
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Collection of malware source code for a variety of platforms in an array of different programming languages.
ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.
Some POCs for my BYOVD research and find some vulnerable drivers
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Collection of various malicious functionality to aid in malware development
ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.
Some POCs for my BYOVD research and find some vulnerable drivers
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Organized list of my malware development resources
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Collection of various malicious functionality to aid in malware development
Collection of malware source code for a variety of platforms in an array of different programming languages.
ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
Collection of malware source code for a variety of platforms in an array of different programming languages.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Organized list of my malware development resources
Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in this exciting journey and add your expertise to our collective eff...
Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)
Collection of various malicious functionality to aid in malware development
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester cred...
Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.
Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in this exciting journey and add your expertise to our collective eff...
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat D...
Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester cred...
Some POCs for my BYOVD research and find some vulnerable drivers
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
Organized list of my malware development resources
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Collection of malware source code for a variety of platforms in an array of different programming languages.
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.
Collection of various malicious functionality to aid in malware development
Organized list of my malware development resources
Some POCs for my BYOVD research and find some vulnerable drivers
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester cred...
Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.
This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can help you out in building your own malware and payloads :D
ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.
Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
Some POCs for my BYOVD research and find some vulnerable drivers
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat D...
My new malware database, the old one is now archived and all my new malwares will be uploaded here instead. As always, this is made for educational purposes only, I'm not responsible for any damages
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can help you out in building your own malware and payloads :D
Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.
This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those dedica...
Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in this exciting journey and add your expertise to our collective eff...
micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those dedica...
ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windows system using C/C++.
This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)
Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis
PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record
The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities on most common services and web technologies. It also has some...
This repository contains my complete resources and coding practices for malware development using Rust 🦀.
Collection of malware source code for a variety of platforms in an array of different programming languages.
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
🦫 | GoRedOps is a repository dedicated to gathering and sharing advanced techniques and offensive malware for Red Team, with a specific focus on the Go programming language, all is made for educatio...
Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.
Collection of various malicious functionality to aid in malware development
Organized list of my malware development resources
Unorthodox and stealthy way to inject a DLL into the explorer using icons
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester cred...
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
Some POCs for my BYOVD research and find some vulnerable drivers
🦀 | RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)
Unorthodox and stealthy way to inject a DLL into the explorer using icons
Some Rust program I wrote while learning Malware Development
PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record
Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.
This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can help you out in building your own malware and payloads :D
İçerisinde her biri özenle yazılmış, 80'den fazla siber güvenlik aracı bulunan kapsamlı bir siber güvenlik aracı.
Python programs & tools built in the Ethical Hacking with Python EBook
My new malware database, the old one is now archived and all my new malwares will be uploaded here instead. As always, this is made for educational purposes only, I'm not responsible for any damages
A collection of offensive Go packages inspired by different Go repositories.
Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends encrypted AES keys to files, and other tactics utilized by advan...