TeamCyberHawkz/awesome-malware-development

GitHub: TeamCyberHawkz/awesome-malware-development

一个面向安全研究人员的恶意软件分析、逆向工程和开发技术综合资源库,旨在帮助安全从业者了解攻击技术以提升防御能力。

Stars: 0 | Forks: 0

``` █████╗ ██╗ ██╗███████╗███████╗ ██████╗ ███╗ ███╗███████╗ ██╔══██╗██║ ██║██╔════╝██╔════╝██╔═══██╗████╗ ████║██╔════╝ ███████║██║ █╗ ██║█████╗ ███████╗██║ ██║██╔████╔██║█████╗ ██╔══██║██║███╗██║██╔══╝ ╚════██║██║ ██║██║╚██╔╝██║██╔══╝ ██║ ██║╚███╔███╔╝███████╗███████║╚██████╔╝██║ ╚═╝ ██║███████╗ ╚═╝ ╚═╝ ╚══╝╚══╝ ╚══════╝╚══════╝ ╚═════╝ ╚═╝ ╚═╝╚══════╝ ███╗ ███╗ █████╗ ██╗ ██╗ ██╗ █████╗ ██████╗ ███████╗ ████╗ ████║██╔══██╗██║ ██║ ██║██╔══██╗██╔══██╗██╔════╝ ██╔████╔██║███████║██║ ██║ █╗ ██║███████║██████╔╝█████╗ ██║╚██╔╝██║██╔══██║██║ ██║███╗██║██╔══██║██╔══██╗██╔══╝ ██║ ╚═╝ ██║██║ ██║███████╗╚███╔███╔╝██║ ██║██║ ██║███████╗ ╚═╝ ╚═╝╚═╝ ╚═╝╚══════╝ ╚══╝╚══╝ ╚═╝ ╚═╝╚═╝ ╚═╝╚══════╝ ██████╗ ███████╗██╗ ██╗███████╗██╗ ██████╗ ██████╗ ███╗ ███╗███████╗███╗ ██╗████████╗ ██╔══██╗██╔════╝██║ ██║██╔════╝██║ ██╔═══██╗██╔══██╗████╗ ████║██╔════╝████╗ ██║╚══██╔══╝ ██║ ██║█████╗ ██║ ██║█████╗ ██║ ██║ ██║██████╔╝██╔████╔██║█████╗ ██╔██╗ ██║ ██║ ██║ ██║██╔══╝ ╚██╗ ██╔╝██╔══╝ ██║ ██║ ██║██╔═══╝ ██║╚██╔╝██║██╔══╝ ██║╚██╗██║ ██║ ██████╔╝███████╗ ╚████╔╝ ███████╗███████╗╚██████╔╝██║ ██║ ╚═╝ ██║███████╗██║ ╚████║ ██║ ╚═════╝ ╚══════╝ ╚═══╝ ╚══════╝╚══════╝ ╚═════╝ ╚═╝ ╚═╝ ╚═╝╚══════╝╚═╝ ╚═══╝ ╚═╝ ```
![Educational Purposes](https://img.shields.io/badge/Purpose-Educational_Only-000000.svg?style=for-the-badge&logo=open-book&logoColor=white) ![Focus](https://img.shields.io/badge/Focus-Awesome_Malware_Development-000000.svg?style=for-the-badge&logo=hackthebox&logoColor=green) ![Contributions](https://img.shields.io/badge/Contributions-Welcome-000000.svg?style=for-the-badge&logo=git&logoColor=green) **Dissect. Understand. Build. Defend.**
### 读取 /etc/disclaimer.txt 为了防御现代对手,你必须了解他们如何构建武器。本仓库作为安全研究人员、分析师和红队的精选资源库,帮助他们掌握恶意软件分析、规避和开发技术。 ### 树形显示 /resources #### 🎓 课程和培训 * [MalDev Academy](https://maldevacademy.com/) * [Sektor7 - RED TEAM Operator: Malware Development Essentials](https://institute.sektor7.net/red-team-operator-malware-development-essentials) * [Sektor7 - RED TEAM Operator: Malware Development Intermediate](https://institute.sektor7.net/rto-maldev-intermediate) * [Sektor7 - RED TEAM Operator: Malware Development Advanced - Vol.1](https://institute.sektor7.net/rto-maldev-adv1) * [Sektor7 - RED TEAM Operator: Malware Development Advanced - Vol.2](https://institute.sektor7.net/rto-maldev-adv2) * [Zero-Point Security - C2 Development in C#](https://training.zeropointsecurity.co.uk/courses/c2-development-in-csharp) * [Udemy - Malware Development Course 2023: From Zero to Hero](https://www.udemy.com/course/malware-development-beginner-level/) * [Udemy - Practical Linux Malware Development](https://www.udemy.com/course/practical-linux-malware-development/) * [Malware on Steroids by Dark Vortex](https://0xdarkvortex.dev/training-programs/malware-on-steroids/) * [Windows Kernel Rootkits](https://www.codemachine.com/trainings/kerrkt.html) #### 🛠️ 工具和框架 * [Havoc (NEW 2024–2026)](https://github.com/HavocFramework/Havoc) – 现代、可定制的 C2 框架,带有精美的 GUI。 * [Sliver](https://github.com/BishopFox/sliver) – 跨平台植入框架。 * [Mythic](https://github.com/MythicAgents) – 高度模块化的跨平台 C2。 #### 🎥 YouTube 资料 * [Malware Evasion Techniques: API Unhooking](https://www.youtube.com/@sonianuj) * [I Created Malware With Python (it's SCARY easy!!)](https://www.youtube.com/watch?v=UtMMjXOlRQc) * [Malware Development Series - crr0ww](https://www.youtube.com/@crr0ww) * [Cosmodium CyberSecurity Playlist](https://www.youtube.com/playlist?list=PL_dk67mLCSFHa5jDNvEuXuoafMHmTjn32) * [I Became a Malware Developer Series](https://www.youtube.com/watch?v=LuUhox_C5yg&list=PL1jK3K11NINhvnr7Y3iGu8eLKec72Sl7D) * [Malware 101 Series](https://www.youtube.com/watch?v=s0suCUwwikA&list=PLXlzLNcZf2-8RnKqZIYYetIuG7rnUmYz-) ### 读取 /var/materials.log #### 📄 在线阅读和文章 * [EDR Bypass Techniques - Cymulate](https://cymulate.com/blog/edr-bypass-part-2-techniques/) * [Malware Development Tricks - Cocomelonc](https://cocomelonc.github.io/malware/2023/01/04/malware-tricks-26.html) * [Maelstrom Series](https://pre.empt.blog/) * [Writing Custom Backdoor Payloads With C#](https://github.com/mvelazc0/defcon27_csharp_workshop) * [Creating a Rootkit to Learn C](https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/#) * [Malware Development Basics](https://github.com/cr-0w/maldev/tree/main) * [String Obfuscation The Malware Way](https://dr4k0nia.github.io/posts/String-Obfuscation-The-Malware-Way/) * [The Art of Malware - Bringing the Dead back to life](https://0x00sec.org/t/the-art-of-malware-bringing-the-dead-back-to-life/19599) * [Analyzing Malware By API Calls](https://www.malwarebytes.com/blog/news/2017/10/analyzing-malware-by-api-calls) * [Malware Dev](https://captmeelo.com/category/maldev) * [Writing a Packer](https://dr4k0nia.github.io/posts/Writing-a-Packer/) * [My First Malware Dev Project in C++](https://malwarexhunt.medium.com/my-first-malware-development-project-in-c-c-logger-stealer-c-c-75b9a0be0540) * [Malware Development 101-From Zero to Non Hero [BSides-2024]](https://github.com/lsecqt/BSides-2024-Malware-Development-101-From-Zero-to-Non-Hero/raw/refs/heads/main/Malware%20Development%20101.pptx) #### 📚 深度解析系列 **Malware Development by 0xPat** * [Basics (Part 1)](https://0xpat.github.io/Malware_development_part_1/) * [Anti Dynamic Analysis & sandboxes (Part 2)](https://0xpat.github.io/Malware_development_part_2/) * [Anti-Debugging (Part 3)](https://0xpat.github.io/Malware_development_part_3/) * [Anti Static Analysis Tricks (Part 4)](https://0xpat.github.io/Malware_development_part_4/) * [Tips & Tricks (Part 5)](https://0xpat.github.io/Malware_development_part_5/) * [Advanced Obfuscation with LLVM (Part 6)](https://0xpat.github.io/Malware_development_part_6/) * [Secure Desktop Keylogger (Part 7)](https://0xpat.github.io/Malware_development_part_7/) * [COFF Injection and In-memory Execution (Part 8)](https://0xpat.github.io/Malware_development_part_8/) * [Hosting CLR and Managed Code Injection (Part 9)](https://0xpat.github.io/Malware_development_part_9/) **Malware Development by sid4hack** * [Part 1](https://sid4hack.medium.com/malware-development-part-1-ea9e26088662) | [Part 2](https://sid4hack.medium.com/malware-development-part-2-459109c50126) | [Part 3](https://sid4hack.medium.com/malware-development-part-3-669bebef79c4) | [Part 4](https://sid4hack.medium.com/malware-development-part-4-9fa5e817ed96) * [Part 5: DLL injection into the process](https://sid4hack.medium.com/malware-development-part-5-dll-injection-into-the-process-bc7f8b63b45b) * [Part 6: DLL hijacking](https://sid4hack.medium.com/malware-development-part-6-dll-hijacking-70bd4611a105) * [Part 7: Advanced Code Injection](https://sid4hack.medium.com/malware-development-7-advanced-code-injection-9343e7e92bd9) * [Part 8: Reverse Shell Via Dll Hijacking](https://sid4hack.medium.com/malware-development-part-8-reverse-shell-via-dll-hijacking-ce48f5ebbafe) ### 列出 /samples_and_source.txt 的详细信息 #### 恶意软件样本和源代码 * [VX Underground](https://vx-underground.org/Samples) * [MalwareBazaar](https://bazaar.abuse.ch/browse/) * [VirusTotal](https://www.virustotal.com/gui/home/search) * [MalShare](https://malshare.com/) * [Tekdefence](http://www.tekdefense.com/downloads/malware-samples/) * [InQuest](https://github.com/InQuest/malware-samples) * [Malware-Feed](https://github.com/MalwareSamples/Malware-Feed/) * [VX Underground GitHub](https://github.com/vxunderground/MalwareSourceCode) * [GitHub Topic: Malware Source Code](https://github.com/topics/malware-source-code) * [The Zoo](https://github.com/ytisf/theZoo) ### 读取 /etc/notes_and_guides * [If you want to get good at Malware Development](https://0x00sec.org/t/if-you-want-to-get-good-at-malware-development/23466) * [How to get into Malware Development (Makosec)](https://makosecblog.com/malware-dev/malware-development-intro/) * [Awesome Malware Development](https://github.com/rootkit-io/awesome-malware-development) ### 执行 ./contribute.sh(需要管理员权限) 本仓库由 @TeamCyberHawkz 维护。如果您有宝贵的教程、工具或研究论文,请提交给我们。 1. **Fork 仓库:** 创建一个分支来添加您的内容。 2. **验证内容:** 确保资源高质量、相关性强且分类正确。 3. **提交 PR:** 提交您的更改并简要描述该资源。

Website

[ Connection Terminated ] // Securing the digital you. 🦅
标签:DAST, 中高交互蜜罐, 二进制分析, 云安全监控, 云安全运维, 云资产清单, 可视化界面, 威胁情报, 工具集, 开发者工具, 恶意软件分析, 恶意软件开发, 教程, 日志审计, 沙箱分析, 漏洞分析, 网络安全, 网络连接监控, 自动回退, 资源集合, 路径探测, 逆向工具, 逆向工程, 隐私保护, 静态分析