Skip to content

Latest commit

 

History

History
36 lines (24 loc) · 1.28 KB

File metadata and controls

36 lines (24 loc) · 1.28 KB

Malware Development Samples

A collection of Windows malware development techniques implemented in C for security research and red team operations.

Categories

📂 Encryption

  • Encrypt: AES and RC4 shellcode encryption
  • Decrypt: AES, RC4, and XOR decryption implementations
  • Lib: Cryptographic library implementations

📂 Injections

  • DLL Injection: Local and remote process injection
  • Shellcode Injection: Local and remote shellcode execution

📂 Obfuscation

  • Encoding: IPv4, IPv6, MAC, and UUID format encoding
  • Decoding: Corresponding decoders for obfuscated payloads

📂 Enumeration

  • Process enumeration and handle retrieval techniques
  • Windows API-based process discovery methods

📂 Staging

  • Stage 1: Registry and webserver payload staging
  • Server: Python-based payload server utilities

Technical Details

All samples target Windows platforms and demonstrate common evasion and execution techniques used in malware analysis and penetration testing.

Disclaimer

⚠️ For Educational and Authorized Security Research Only

This repository is intended solely for security research, education, and authorized penetration testing. Unauthorized use of these techniques may violate laws. Use responsibly and ethically.