ELMERIKH / Beryl
Payload Dropper with Persistance & Privesc & UAC bypass π±βπ€
β13Updated last year
Alternatives and similar repositories for Beryl:
Users that are interested in Beryl are comparing it to the libraries listed below
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.β13Updated 2 weeks ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID stringsβ15Updated last year
- web based c2 π΄ββ οΈβ13Updated 8 months ago
- My Own VirtualAlloc Implementation to use as alternative unknown for all the defense solutions of VirtualAlloc Win32 API Functionβ8Updated last year
- Abusing autoElevate - Fully Undetectable UAC Bypass exploitβ11Updated 2 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file shareβ16Updated 2 years ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.β18Updated 2 weeks ago
- Just another Process Injection using Process Hollowing technique.β17Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system cβ¦β24Updated 7 months ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalationβ21Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe componentβ11Updated last year
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.β11Updated 2 weeks ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsingβ¦β20Updated 2 weeks ago
- Parent Process ID Spoofing, coded in CGo.β21Updated 2 weeks ago
- π‘οΈ A multi-user malleable C2 framework targeting Windows. Written in C++ and Pythonβ44Updated last year
- Change hash for a signed peβ16Updated last year
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)β13Updated this week
- π§ C# UAC Bypass technique using mock directories π§β28Updated 2 years ago
- PDF Icon File Type Spooferβ14Updated 9 months ago
- A simple website to act as a store for havoc modules and extensionsβ26Updated 3 months ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.β20Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantationβ69Updated last year
- Custom Python shellcode encryptor and obfuscatorβ12Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secuβ¦β41Updated 11 months ago
- Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus totalβ9Updated last year
- Making Shellcode fully undetectable using uuidβ23Updated 3 years ago
- Utilizing Alternative Shellcode Execution Via Callbacksβ13Updated last year
- A simple Nim stager (w/ fiber execution)β17Updated 3 years ago
- Another AMSI bypass - but in C++.β23Updated last year
- A malicous Golang Packageβ13Updated 2 weeks ago