AdvDebug / HEVDExploitsLinks
HEVD Exploits for fun and learning.
☆15Updated 5 months ago
Alternatives and similar repositories for HEVDExploits
Users that are interested in HEVDExploits are comparing it to the libraries listed below
Sorting:
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆22Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- Python3 tool to perform password spraying using RDP☆16Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- ☆30Updated 5 months ago
- Seven different DLL injection techniques in one single project.☆13Updated 5 years ago
- An offensive security framework for writing payloads☆18Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- A kernel driver to get a Handle to virtually *every* process☆13Updated 2 years ago
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Updated 2 years ago
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆20Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Updated 5 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Updated 9 months ago
- Loading and executing shellcode in C# without PInvoke.☆22Updated 4 years ago
- A solution to create obfuscated download cradles for PowerShell.☆16Updated 3 years ago
- string/file/shellcode encryptor using AES/XOR☆11Updated 2 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Updated 9 months ago
- IAT Unhooking proof-of-concept☆34Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆40Updated 3 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Updated 10 months ago
- ☆16Updated 4 years ago
- Process injection via native Windows APIs (NTAPIs)☆15Updated 2 years ago
- Poc of using youtube comments for C2 communications☆10Updated 4 years ago
- ⚔️ Red Team tools for capturing credentials & planting payloads using native Windows features.☆10Updated last week
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆70Updated 2 years ago
- ☆24Updated last year