EgeBalci / WSAAcceptBackdoor
Winsock accept() Backdoor Implant.
☆112Updated 4 years ago
Alternatives and similar repositories for WSAAcceptBackdoor:
Users that are interested in WSAAcceptBackdoor are comparing it to the libraries listed below
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 4 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆71Updated last year
- Evasive Process Hollowing Techniques☆136Updated 4 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆69Updated 2 years ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆82Updated 3 years ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆105Updated last month
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆74Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated 2 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆73Updated 7 years ago
- A simple implant showcasing modern C++☆105Updated 4 years ago
- Example code for EDR bypassing☆150Updated 6 years ago
- Shellcode injector using direct syscalls☆119Updated 4 years ago
- Windows user-land hooks manipulation tool.☆141Updated 3 years ago
- Userland API Unhooker Project☆108Updated 3 years ago
- ☆112Updated 2 years ago
- Project to check which Nt/Zw functions your local EDR is hooking☆182Updated 3 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆187Updated 4 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆108Updated 3 years ago
- Compile shellcode into an exe file from Windows or Linux.☆65Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆36Updated 3 years ago
- Experiment on reproducing Obfuscate & Sleep☆141Updated 4 years ago
- Golang PE injection on windows☆163Updated 3 years ago
- Detect strange memory regions and DLLs☆180Updated 3 years ago
- PoC MSVC COFF Object file loader/injector.☆171Updated 3 years ago
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆36Updated 3 years ago
- ☆158Updated 3 years ago
- Set of antianalysis techniques found in malware☆129Updated last year
- Kernel Exploits☆249Updated 3 years ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆225Updated 3 months ago
- Assembly block for hooking windows API functions.☆87Updated 5 years ago