Stars
Work-in-progress tool to reverse unity's IL2CPP toolchain.
Seamless operability between C++11 and Python
Memory-Hacking Software (MHS) X, the new from-scratch MHS, the next most-popular RAM-searching/debugging/game-hacking tool after Cheat Engine.
This repository is a speedhack for games that are not protected by driver anti-cheat. The speedhack is similar to the speedhack from Cheat Engine!
安卓锁屏密码暴力破解工程,Android6.0 py代码、Android5.0及以下 java代码
Resources for learning about Exploit Development
Executable that mutates its own code
alexandreborges / winafl
Forked from googleprojectzero/winaflA fork of AFL for fuzzing Windows binaries
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, Th…
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, S390x, TriCore, X86)
An open-source Secure Email Gateway (SEG) evaluation toolkit designed for red-teamers.
The goal of this project is to bypass Windows Defender using a malware and phishing attack method.
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
Formely KMon, a Windows Kernel Driver designed to prevent malware attacks by monitoring the creation of registry keys in common autorun locations and prompting the user whether they want to allow t…
Trolling malware that hides as a Windows service hosted under a legitimate svchost.exe. Good for LAN parties.
Advanced Windows implant API that uses RPC as a listen mechanism. Winapi experience preferred.
Contains malwares made while exploring the windows API
Class containing Anti-RE, Anti-Debug and Anti-Hook methods. Made for C++/CLI
Powerfull Windows Viruses by VBScript! In this file, There are many powerful viruses 💀 that can damage your PC in a matter of seconds.
CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to identify and watch malware that has created a hidden desktop.
Examples of malware's anti- techniques for Windows x86 architecture. Keywords: Windows, Malware, x86, anti-debugging, anti-VM, sandbox detection