3xp0rt / VX-API
Collection of various WINAPI tricks / features used or abused by Malware
☆13Updated 3 years ago
Alternatives and similar repositories for VX-API
Users that are interested in VX-API are comparing it to the libraries listed below
Sorting:
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- ☆12Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆38Updated 4 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆32Updated 2 years ago
- Malware Libraries focused in help Malware Development☆18Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- ☆48Updated last year
- hiding in plain sight: part 2☆45Updated 10 months ago
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 8 months ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆16Updated last year
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆49Updated 3 years ago
- using the gpu to hide your payload☆57Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆48Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated 2 years ago
- ☆17Updated 7 months ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated 10 months ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆32Updated last year
- AMSI Bypass for powershell☆30Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- RATs library 2003 to present☆14Updated last year
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆62Updated last year
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆55Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- Repository for archiving Cobalt Strike configuration☆30Updated this week
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago