☆12Feb 28, 2022Updated 4 years ago
Alternatives and similar repositories for AM
Users that are interested in AM are comparing it to the libraries listed below
Sorting:
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Group 4 - C# Remote Administrator Tool☆11Feb 18, 2025Updated last year
- Mining on restricted environments made easy! Hidden GUI Ethereum miner that mines to NiceHash wallet or Normal Ethereum wallet.…☆13Oct 24, 2020Updated 5 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Aug 11, 2023Updated 2 years ago
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- ☆20Jul 23, 2023Updated 2 years ago
- This project is created for research into antivirus evasion by unhooking.☆18Sep 2, 2021Updated 4 years ago
- A simple dnSpy extension for easily renaming members.☆20May 27, 2023Updated 2 years ago
- D/Invoke standalone shellcode runners☆39Nov 23, 2023Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Inject dll to explorer.exe and hide file from process.☆23Apr 24, 2021Updated 4 years ago
- A Simple PoC☆22May 24, 2024Updated last year
- ☆19Mar 21, 2020Updated 5 years ago
- x86 CIL compiler made in C#.☆22Oct 11, 2022Updated 3 years ago
- Red Team Operation's Defense Evasion Technique.☆56Jun 4, 2024Updated last year
- Utility that tries to generate every single CIL opcode possible in a valid context.☆28Sep 7, 2022Updated 3 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Jan 30, 2025Updated last year
- Simple and sane cryptographic wrapper library.☆33Apr 21, 2023Updated 2 years ago
- A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script☆24Oct 19, 2019Updated 6 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- Malware?☆77Oct 26, 2025Updated 4 months ago
- 🛠️🐧 "All-in-One Linux Server Toolkit: Status Check + Access" 💥💻☆19Mar 18, 2025Updated 11 months ago
- My personal shellcode loader☆32Mar 9, 2023Updated 2 years ago
- Hide a loaded dynamic link library from memory☆34Jun 13, 2021Updated 4 years ago
- Load PE via XML Attribute☆32Feb 1, 2020Updated 6 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Sep 6, 2019Updated 6 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆31Jun 23, 2022Updated 3 years ago
- Patch AMSI and ETW in remote process via direct syscall☆84Apr 28, 2022Updated 3 years ago
- ☆18Nov 20, 2020Updated 5 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Bashful argument parsing☆13May 13, 2020Updated 5 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆45Oct 27, 2022Updated 3 years ago