Collection of various malicious functionality to aid in malware development
-
Updated
Feb 28, 2024 - C++
Collection of various malicious functionality to aid in malware development
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Experimental Windows x64 Kernel Rootkit.
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.
Unorthodox and stealthy way to inject a DLL into the explorer using icons
Windows handle hijacker
Russian Wipers Dropper (educational-purposes )
Firefox webInjector capable of injecting codes into webpages using a mitmproxy.
This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)
ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.
Rootkit for Windows 32-bit
🛰️ Remote administration tool
Create custom Autorun.inf for removable media
x86 Funny malware that Troll GTA players by killing the character every time it respawn
IHkey is win32 ransomware built using VS 2022 + C++ 17
Defense Evasion Techniques Repository. This repository contains a collection of techniques designed to bypass Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) systems.
Add a description, image, and links to the malware-development topic page so that developers can more easily learn about it.
To associate your repository with the malware-development topic, visit your repo's landing page and select "manage topics."