0xNinjaCyclone / hellMaker
Generate FUD backdoors
☆243Updated last year
Alternatives and similar repositories for hellMaker:
Users that are interested in hellMaker are comparing it to the libraries listed below
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆124Updated last year
- Amsi Bypass payload that works on Windwos 11☆375Updated last year
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆305Updated 6 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆240Updated last year
- A shellcode injection tool showcasing various process injection techniques☆135Updated last year
- Materials for the workshop "Red Team Ops: Havoc 101"☆365Updated 4 months ago
- ☆288Updated last year
- A solution to create obfuscated reverse shells for PowerShell.☆74Updated 2 years ago
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆141Updated last month
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆374Updated 6 months ago
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆552Updated 7 months ago
- PDF dropper Red Team Scenairos☆182Updated 6 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆161Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆161Updated 11 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆289Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆91Updated 3 years ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆339Updated 2 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆241Updated this week
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆150Updated 9 months ago
- Command & Control-Framework created for collaboration in python3☆314Updated last year
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆76Updated last year
- Generate an obfuscated DLL that will disable AMSI & ETW☆316Updated 7 months ago
- This is for Ethical Use only!☆29Updated 2 weeks ago
- Analyse your malware to surgically obfuscate it☆452Updated last month
- Extract and execute a PE embedded within a PNG file using an LNK file.☆355Updated 3 months ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆114Updated 7 months ago
- ☆271Updated last year
- Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol☆260Updated 2 years ago
- ☆103Updated 5 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆278Updated 8 months ago