☆12Mar 8, 2026Updated 3 weeks ago
Alternatives and similar repositories for AmsiResurrect
Users that are interested in AmsiResurrect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- this is a simple shell that has the ability to bypass defenses☆13Mar 8, 2026Updated 3 weeks ago
- helper encrypt data☆10Mar 8, 2026Updated 3 weeks ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Aug 11, 2023Updated 2 years ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆18Mar 19, 2025Updated last year
- ☆15Feb 9, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Using the Windows API to mess with Task Manager in GoLANG☆15Sep 7, 2021Updated 4 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- This project is created for research into antivirus evasion by unhooking.☆18Sep 2, 2021Updated 4 years ago
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆27Nov 30, 2025Updated 3 months ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- Group 4 - C# Remote Administrator Tool☆11Feb 18, 2025Updated last year
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A Python API Client for Gophish☆52Jan 11, 2024Updated 2 years ago
- ☆20Jul 23, 2023Updated 2 years ago
- Vulnerable Terraform Projects - Fork of https://github.com/bridgecrewio/terragoat☆17Apr 23, 2024Updated last year
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- POC Telegram C2 agent in NodeJS☆15Jul 15, 2020Updated 5 years ago
- A Simple PoC☆22May 24, 2024Updated last year
- ☆12Apr 11, 2025Updated 11 months ago
- D/Invoke standalone shellcode runners☆40Nov 23, 2023Updated 2 years ago
- My mobile writeups repository☆28Nov 19, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A simple dnSpy extension for easily renaming members.☆20May 27, 2023Updated 2 years ago
- Mining on restricted environments made easy! Hidden GUI Ethereum miner that mines to NiceHash wallet or Normal Ethereum wallet.…☆13Oct 24, 2020Updated 5 years ago
- SamrSearch can get user info and group info with MS-SAMR.☆15Feb 15, 2022Updated 4 years ago
- Accelerating DevSecOps on AWS, published by Packt☆14Jan 30, 2023Updated 3 years ago
- ☆19Mar 21, 2020Updated 6 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- Inject dll to explorer.exe and hide file from process.☆23Apr 24, 2021Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆55Mar 3, 2022Updated 4 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆31Jan 30, 2025Updated last year
- PACU - Phishing Automation & Campaigning Utility☆37Nov 9, 2022Updated 3 years ago
- Shows CPUID features and instruction encodings used by x86/x64 binaries☆18Jan 2, 2026Updated 2 months ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Patch AMSI and ETW in remote process via direct syscall☆85Apr 28, 2022Updated 3 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago