Skip to content

Nxvh1337/maldevSamples

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Malware Development Samples

A collection of Windows malware development techniques implemented in C for security research and red team operations.

Categories

📂 Encryption

  • Encrypt: AES and RC4 shellcode encryption
  • Decrypt: AES, RC4, and XOR decryption implementations
  • Lib: Cryptographic library implementations

📂 Injections

  • DLL Injection: Local and remote process injection
  • Shellcode Injection: Local and remote shellcode execution

📂 Obfuscation

  • Encoding: IPv4, IPv6, MAC, and UUID format encoding
  • Decoding: Corresponding decoders for obfuscated payloads

📂 Enumeration

  • Process enumeration and handle retrieval techniques
  • Windows API-based process discovery methods

📂 Staging

  • Stage 1: Registry and webserver payload staging
  • Server: Python-based payload server utilities

Technical Details

All samples target Windows platforms and demonstrate common evasion and execution techniques used in malware analysis and penetration testing.

Disclaimer

⚠️ For Educational and Authorized Security Research Only

This repository is intended solely for security research, education, and authorized penetration testing. Unauthorized use of these techniques may violate laws. Use responsibly and ethically.

About

C samples that executes shellcodes

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors