0xyg3n / mem64
Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.
☆27Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for mem64
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- ☆17Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 6 years ago
- ☆22Updated 8 years ago
- A simple reflective dll example☆18Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- HTTP BOTNET☆8Updated last year
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- Several self-defense shellcodes☆22Updated 5 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 7 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Random stuff☆16Updated 6 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆25Updated 6 years ago
- ☆24Updated 6 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated 7 months ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆42Updated 7 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆41Updated 6 years ago
- ☆24Updated 6 years ago
- Asynchronous MSF RPC API wrapper☆20Updated last year
- Mimikatz HashClash☆12Updated 9 years ago
- Simple C# reverse shell with shellcode and process injection☆40Updated 8 years ago
- ☆43Updated 5 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Updated 4 years ago