Lists (1)
Sort Name ascending (A-Z)
Stars
REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs written in Rust. 🦀
RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and reflection techniques for code injection. This PoC showcases…
moonflowersl / meow
Forked from cocomelonc/meowCybersecurity research results. Simple C/C++ and Python implementations
moonflowersl / LitterBox
Forked from BlackSnufkin/LitterBoxsandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment
TH3P1T / xeno-rat
Forked from moom825/xeno-ratXeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system management.
TH3P1T / Nimcrypt2
Forked from icyguider/Nimcrypt2.NET, PE, & Raw Shellcode Packer/Loader Written in Nim
TH3P1T / Shhhloader
Forked from icyguider/ShhhloaderSysWhispers Shellcode Loader (Work in Progress)
TH3P1T / windows-rootkit
Forked from shaygitub/windows-rootkitwindows rootkit
TH3P1T / r77-rootkit
Forked from bytecode77/r77-rootkitFileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
TH3P1T / PPL-0day
Forked from pulpocaminante/PPL-0dayDemoting PPL anti-malware services to less than a guest user
A feature rich DLL injection library.
Prevent DiscordHook64.dll from loading into a specific process.
Linux-based botnet builder designed for creating advanced botnet payloads.
Malicious URL Detection Model NN optimized by Genetic Algorithms 🧬
AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄
Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.
Proof of concept & details for CVE-2025-21298
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization,…
Organized list of my malware development resources