C2 extensible for post-explotation and remote control
-
Updated
Mar 4, 2024 - C
C2 extensible for post-explotation and remote control
A simple runner to generate a spoofed cert for msfvenom payload to bypass all AV's signature
A linux malware that exploits .bashrc file on linux!
Code repository for my malware development blog series
Demo work of injection into someone else's address space process
Sandbox zum testen verdächtiger software auf schädliche aktivitäten
InjectionLab is an educational toolkit showcasing various Windows code injection techniques. It provides well-documented examples for security researchers and defenders to explore process injection, memory manipulation, and detection strategies.
Add a description, image, and links to the malware-developing topic page so that developers can more easily learn about it.
To associate your repository with the malware-developing topic, visit your repo's landing page and select "manage topics."