AndreySokolov247 / SLoaderLinks
Shellcode Loader | xss.is
☆14Updated last year
Alternatives and similar repositories for SLoader
Users that are interested in SLoader are comparing it to the libraries listed below
Sorting:
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- An aggressor script that can help automate payload building in Cobalt Strike☆118Updated last year
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- A shellcode injection tool showcasing various process injection techniques☆136Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated 2 years ago
- PowerShell script to generate ShellCode in various formats☆46Updated last year
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆259Updated 2 years ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated 2 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- Scripts permettant de contourner la protection antivirale de Windows Defender via la technique de Direct Syscalls avec une injection de s…☆30Updated 3 years ago
- Evasive Golang Loader☆137Updated last year
- A C2 framework built for my bachelors thesis☆56Updated last month
- LSTAR - CobaltStrike Translated to EN☆22Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Updated 3 years ago
- ☆29Updated 2 years ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆105Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆172Updated last year
- Dump Windows SAM hashes☆42Updated 2 years ago
- Chrome browser extension-based Command & Control☆228Updated 6 months ago
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆17Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆73Updated last year
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆62Updated last year
- A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)☆23Updated last year
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆281Updated 10 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆155Updated last year
- Windows Privilege Escalation☆70Updated 3 years ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated 2 years ago