CyberSecurityExploitDevelopment / WindowsEternalBlue
Fully Functional MS17-10 EternalBlue Exploit Written in C++ on windows for windows
☆11Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for WindowsEternalBlue
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆29Updated 3 years ago
- ☆22Updated last year
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆16Updated 2 years ago
- using the Recycle Bin to insure persistence☆11Updated 2 years ago
- A Windows lightweight RAT written in C++☆9Updated 4 years ago
- Bypass UAC by abusing shell protocol handlers☆13Updated 3 years ago
- Infects PE files with a shellcode☆15Updated 6 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆9Updated 3 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆19Updated 3 years ago
- Loader and RunPE file executer☆17Updated 5 years ago
- Rebuild of the original Remote Admin Tool☆9Updated 4 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Reverse Socks5 proxy for windows☆12Updated 2 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- Multipurpose malware framework☆22Updated 2 years ago
- Append custom data to signed pe file and DONOT DESTROY SIGNED STATUS.☆25Updated 3 years ago
- Process Hollowing POC in CPP☆15Updated 4 years ago
- Process Hollowing demonstration & explanation☆32Updated 3 years ago
- Windows Kernel Mode Rootkit☆10Updated 8 months ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Updated 3 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆19Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 2 years ago
- Collection of shellcode injection and execution techniques☆16Updated 3 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆27Updated 3 years ago
- DarkRats Standalone HVNC☆23Updated 2 years ago