A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess
☆10Aug 1, 2021Updated 4 years ago
Alternatives and similar repositories for Dropper-Sektor7-Testing
Users that are interested in Dropper-Sektor7-Testing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AdminX it's a Malware to execute process as some users from a Windows OS☆11May 4, 2023Updated 2 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆11Apr 6, 2023Updated 2 years ago
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- 该项目为Shellocde加载器,详细介绍了我们如何绕过防病毒软件,以及该工具如何使用☆21Jun 22, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- vex - an asynchronous reverse connection helper for SOCKS4/5 proxies.☆16Feb 27, 2020Updated 6 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- 去掉获取系统信息回传到www.shack2.org的工具☆17Aug 16, 2021Updated 4 years ago
- reverse proxy server☆19Jul 7, 2016Updated 9 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- Simple Ransoware to attack Windows 🌟☆25Apr 19, 2023Updated 2 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- Infects PE files with a shellcode☆22Oct 20, 2018Updated 7 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- ☆10Oct 1, 2023Updated 2 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- ☆12Oct 29, 2021Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- Inject shellcode into process via "EarlyBird"☆26Aug 30, 2021Updated 4 years ago
- ☆16Mar 2, 2025Updated last year
- PE(compressed dll) memory loader using nt api☆46Jul 3, 2017Updated 8 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- 过木马免杀制作器☆55Sep 26, 2023Updated 2 years ago
- Implementing AES 256 CBC in AES-NI - MASM Format☆19Aug 9, 2025Updated 7 months ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- Struts2框架全系列漏洞扫描工具 / Code By:Jun_sheng☆35Jul 8, 2022Updated 3 years ago
- Simple C++ ransomware, prove the concept.☆27Mar 8, 2017Updated 9 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Nov 29, 2022Updated 3 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 2 years ago
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆26Nov 26, 2025Updated 3 months ago
- Rust Weaponization for Red Team Engagements.☆15Oct 9, 2021Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- a simple reverse connected bot in golang.☆17Jun 14, 2022Updated 3 years ago
- Inject dll to explorer.exe and hide file from process.☆23Apr 24, 2021Updated 4 years ago