Malforge Maldev Public Organization
Popular repositories Loading
-
NT-API-Code-Injection
NT-API-Code-Injection PublicNT API Code Injection using NtCreateSection and NtMapViewOfSection to inject shellcode into a remote process. This method allows for efficient memory manipulation and code execution within target p…
C 1
-
asynchronous-code-injection
asynchronous-code-injection PublicA deep dive into asynchronous code injection using APC techniques. Includes code samples, step-by-step explanations, and real-world POCs.
C 1
-
WinLogon-Reverse-Shell-Persistence
WinLogon-Reverse-Shell-Persistence PublicA method for achieving Windows persistence by leveraging the Winlogon registry key. It includes a modified C++ reverse shell and a step-by-step guide on using the Userinit key to maintain access to…
-
Windows-Persistence-CheatSheet
Windows-Persistence-CheatSheet PublicA practical cheatsheet demonstrating key Windows persistence methods for red team assessments and malware research.
-
Executing-ShellCode-Introduction
Executing-ShellCode-Introduction PublicA guide on how to executing Malicious Shell-Code with C++
C++
-
Process-Code-Injection
Process-Code-Injection PublicA simple implementation of process code injection. This demonstrates injecting shellcode into a remote process, using basic Windows API functions for process manipulation.
C
Repositories
- Process-Code-Injection-Techniques-Cheatsheet Public
A concise cheatsheet covering key process code injection techniques for red teaming and malware development.
Malforge-Maldev-Public-Organization/Process-Code-Injection-Techniques-Cheatsheet’s past year of commit activity - Code-Execution-via-Callbacks-CheatSheet Public
This repository contains a practical cheat sheet demonstrating various callback-based techniques to execute shellcode on Windows, with detection insights and code samples.
Malforge-Maldev-Public-Organization/Code-Execution-via-Callbacks-CheatSheet’s past year of commit activity - Executing-Code-via-EnumDesktopsW-Callback Public
This repository demonstrates how to execute shellcode on a Windows machine using the `EnumDesktopsW` callback mechanism. It leverages memory allocation, shellcode injection, and callback execution for proof-of-concept.
Malforge-Maldev-Public-Organization/Executing-Code-via-EnumDesktopsW-Callback’s past year of commit activity - Multi-Platform-Malware Public
Cross-architecture malware designed to run seamlessly on both 32-bit and 64-bit Windows systems, featuring dynamic shellcode execution and reverse shell capabilities.
Malforge-Maldev-Public-Organization/Multi-Platform-Malware’s past year of commit activity - Process-Hollowing Public
Process Hollowing is a stealthy injection method that runs malicious code inside a legitimate process.
Malforge-Maldev-Public-Organization/Process-Hollowing’s past year of commit activity - asynchronous-code-injection Public
A deep dive into asynchronous code injection using APC techniques. Includes code samples, step-by-step explanations, and real-world POCs.
Malforge-Maldev-Public-Organization/asynchronous-code-injection’s past year of commit activity - Bypass-Windows-Defender-Static-Detection Public
This repository demonstrates basic static detection evasion techniques for Windows Defender. It includes code to inject an XOR-encrypted reverse shell payload into a remote process using common Windows API calls. The payload is stored in the .rsrc section and decrypted at runtime.
Malforge-Maldev-Public-Organization/Bypass-Windows-Defender-Static-Detection’s past year of commit activity - EarlyBird-APC-Code-Injection Public
EarlyBird APC Injection is a stealthy process injection technique that queues malicious shellcode into a suspended thread of a newly created process. Once the thread is resumed, the payload executes, making detection and analysis more difficult.
Malforge-Maldev-Public-Organization/EarlyBird-APC-Code-Injection’s past year of commit activity - Thread-IDs-Process-IDs-The-Start-of-Malware-Magic Public
ThreadIDs and ProcessIDs: The foundation of malware techniques, covering the basics of PIDs, TIDs, and their role in code injection and malware devlopment,.
Malforge-Maldev-Public-Organization/Thread-IDs-Process-IDs-The-Start-of-Malware-Magic’s past year of commit activity - NT-API-Code-Injection Public
NT API Code Injection using NtCreateSection and NtMapViewOfSection to inject shellcode into a remote process. This method allows for efficient memory manipulation and code execution within target processes.
Malforge-Maldev-Public-Organization/NT-API-Code-Injection’s past year of commit activity
People
This organization has no public members. You must be a member to see who’s a part of this organization.
Top languages
Loading…
Most used topics
Loading…