3xp0rt / VX-API
Collection of various WINAPI tricks / features used or abused by Malware
☆14Updated 3 years ago
Alternatives and similar repositories for VX-API:
Users that are interested in VX-API are comparing it to the libraries listed below
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆61Updated last year
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆16Updated last year
- A shellcode runner / injector / hollower in Go, for windows☆26Updated 2 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆38Updated 4 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆78Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- ☆36Updated 3 weeks ago
- IDA Python scripts☆34Updated this week
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- Repository for archiving Cobalt Strike configuration☆29Updated this week
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated 10 months ago
- API Hammering with C++20☆45Updated 2 years ago
- ☆48Updated last year
- ☆9Updated 4 months ago
- A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.☆25Updated last year
- ☆12Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- Tips and tricks on reversing and exploiting Windows using free and easy to get tools.☆25Updated 2 years ago
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆23Updated 2 years ago
- ☆12Updated last year
- ☆25Updated 4 months ago
- ☆32Updated last year
- Custom Python shellcode encryptor and obfuscator☆12Updated 11 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆20Updated last year