This repository showcases a collection of techniques used in malware development, demonstrated through code snippets written in Zig. Its primary goal is to highlight the capabilities of the Zig programming language and explore how it can be effectively leveraged for offensive security tooling.
While there's no set timeline for upcoming topics, the first blog post is already live—detailing the implementation of the Hell's Gate technique in Zig, along with the full source code.