3xp0rt / VX-APILinks
Collection of various WINAPI tricks / features used or abused by Malware
☆13Updated 3 years ago
Alternatives and similar repositories for VX-API
Users that are interested in VX-API are comparing it to the libraries listed below
Sorting:
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated 10 months ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆32Updated last year
- ☆33Updated last year
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆39Updated 4 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆16Updated last month
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆35Updated 2 months ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆57Updated 2 years ago
- a small wiper malware programmed in c#☆58Updated 2 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated last year
- AMSI Bypass for powershell☆30Updated 3 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- RATs library 2003 to present☆14Updated last year
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- ☆12Updated last year
- Bypass Malware Time Delays☆102Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆77Updated 2 years ago
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆33Updated 3 months ago
- Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and en…☆41Updated 9 months ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- Make an Linux Kernel rootkit visible again.☆53Updated 4 months ago