CodiumAlgorithm / -Delphi-Process-Hollowing-RunPE-by-Jean-Pierre-LESUEUR
Delphi Process Hollowing, Updated.
☆5Updated 2 years ago
Alternatives and similar repositories for -Delphi-Process-Hollowing-RunPE-by-Jean-Pierre-LESUEUR:
Users that are interested in -Delphi-Process-Hollowing-RunPE-by-Jean-Pierre-LESUEUR are comparing it to the libraries listed below
- VBS Crypter, Exe To VBS☆14Updated 2 years ago
- Caesar Cipher☆5Updated 2 years ago
- ☆7Updated 2 years ago
- Manual Map Your Files, Bypass 100% Runtime.☆11Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆11Updated 8 months ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 8 months ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆10Updated 2 years ago
- Windows Network File System Remote exploit for CVE-2022-30136☆11Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆18Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆14Updated last year
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- ☆10Updated 3 months ago
- Create a lnk shortcut file for Windows☆15Updated 5 years ago
- ☆13Updated 11 months ago
- Red Team Projects with chat.openai.com.☆17Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Updated 3 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 3 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆17Updated 2 years ago
- Excel Add In Payload Generator☆10Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆15Updated 4 months ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆17Updated last year
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Updated 2 years ago