Shady Shahin's repositories
malwareanalysis
Will Share Malware Analysis Reports For the love of God <3
Building-Secure-Applications-with-Cryptography-in-.NET-Course-Source-Code
The source code for the Pluralsight course, Building Secure Applications with Cryptography in .NET
CommandLineUtils
Command line parsing and utilities for .NET
CSE509-Rootkit
After attackers manage to gain access to a remote (or local) machine and elevate their privileges to "root", they typically want to maintain their access, while hiding their presence from the normal users and administrators of the system. This basic rootkit works on the Linux operating system and is a loadable kernel module which when loaded into the kernel (by the attacker with root privileges) will do the following: 1) Hide specific files and directories from showing up when a user does "ls" and similar commands 2) Modify the /etc/passwd and /etc/shadow file to add a backdoor account while returning the original contents of the files (pre-attack) when a normal user requests to see the file 3) Hides processes from the process table when a user does a "ps" 4) Give the ability to a malicious process to elevate its uid to 0 (root) upon demand
CVE
Received CVE list
Database-Engine
DB engine
hiewkey
Keyboard helper for Hiew
hugo-coder
A minimalist blog theme for hugo.
Mandark
💉 Tiny 64-bit RunPE written in C# 💉
minimal-mistakes
:triangular_ruler: Jekyll theme for building a personal site, blog, project documentation, or portfolio.
ProcessInjection
This program is designed to demonstrate various process injection techniques
rangoware
Golang Ransomware
Ransomware
Ransomeware attack in linux
ReflectiveDLLInjection
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
Resuce-Simulation---Game
Game Project -OOP
SharpC2
Command and Control Framework written in C#.
shellcode_tools
Miscellaneous tools written in Python, mostly centered around shellcodes.
sliver
Adversary Emulation Framework
VBS-Obfuscator-in-Python
VBScript obfuscation to allow PenTesters bypass countermeasures.
venom
venom - shellcode generator/compiler/handler (metasploit)
x64dbg-ghidra
Import an x64dbg database into a Ghidra Project