DeimosDemise / AbaddonDropperLinks
This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course
☆30Updated 3 years ago
Alternatives and similar repositories for AbaddonDropper
Users that are interested in AbaddonDropper are comparing it to the libraries listed below
Sorting:
- This script make any windows compatible with RDP connection☆21Updated 2 months ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 4 years ago
- Injecting shellcode into a process memory and executing it in C#☆52Updated 3 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆102Updated last year
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆43Updated 3 years ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Updated 4 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- ☆16Updated 4 years ago
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- Download a payload and make it run from registry without droppng.☆109Updated 6 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆16Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆30Updated 3 years ago
- Download a .NET payload and run it on memory☆70Updated 6 years ago
- UAC Bypass for windows☆37Updated 5 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Updated 4 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- File and executable crypter with comprehensible GUI and built-in anti-malicious use☆21Updated 5 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 2 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆31Updated 5 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Updated 5 years ago
- Криптор на шелл-кодах☆11Updated 5 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆46Updated 3 years ago
- Hellokitty Ransomware Source Code☆16Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago
- NanoCore rat stub source code☆38Updated 3 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆106Updated 2 years ago