ELMERIKH / BerylLinks
Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤
☆14Updated last year
Alternatives and similar repositories for Beryl
Users that are interested in Beryl are comparing it to the libraries listed below
Sorting:
- A malicous Golang Package☆15Updated 9 months ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- ☆52Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Ransomware written in go, encrypt - decrypt.☆29Updated 9 months ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆22Updated last year
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Updated 3 years ago
- VBS Crypter, Exe To VBS☆15Updated 3 years ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆26Updated 5 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19Updated 9 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Updated 9 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated this week
- A PowerShell malware that disables all the Windows Security features with UAC Bypass and Anti-VM features. (Designed to work both as a po…☆46Updated 8 months ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Updated last year
- Manual Map Your Files, Bypass 100% Runtime.☆11Updated 3 years ago
- Parent Process ID Spoofing, coded in CGo.☆24Updated 9 months ago
- Thats it! An Open-Source Windows UEFI Rootkit☆28Updated 6 months ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆60Updated 2 months ago
- AES-256 Microsoft Cryptography API Example Use.☆34Updated last week
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆22Updated last week
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆44Updated 5 months ago
- ☆17Updated 6 years ago
- Various methods of executing shellcode☆74Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- Excel Add In Payload Generator☆14Updated 2 years ago
- ☆11Updated 3 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated 2 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Updated 4 years ago