EgeBalci / WSAAcceptBackdoorView external linksLinks
Winsock accept() Backdoor Implant.
☆118Feb 13, 2021Updated 5 years ago
Alternatives and similar repositories for WSAAcceptBackdoor
Users that are interested in WSAAcceptBackdoor are comparing it to the libraries listed below
Sorting:
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆107Jan 3, 2021Updated 5 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 4 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 4 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- A "no frills" 1 class-only, C# .NET command line parser with support for - and / args, switches only, and Name : Values☆34Jan 20, 2026Updated 3 weeks ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- ☆73Oct 24, 2021Updated 4 years ago
- A shellcode function to encrypt a running process image when sleeping.☆340Sep 11, 2021Updated 4 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆167May 27, 2021Updated 4 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆107Mar 8, 2023Updated 2 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- inject shellcode into remote process via message hook☆15Oct 28, 2020Updated 5 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Jul 23, 2020Updated 5 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- AMSI Bypass Via the Heap☆107Nov 20, 2020Updated 5 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆121Jun 24, 2020Updated 5 years ago
- Project to check which Nt/Zw functions your local EDR is hooking☆198Mar 21, 2021Updated 4 years ago
- PoC for hiding PE exports☆67Dec 19, 2020Updated 5 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆292Mar 8, 2023Updated 2 years ago
- Userland API Unhooker Project☆110Jun 14, 2021Updated 4 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆61Jul 10, 2024Updated last year
- A quick example of the Hells Gate technique in Nim☆96Aug 11, 2021Updated 4 years ago
- C# Implementation of the Hell's Gate VX Technique☆216Jun 30, 2020Updated 5 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 5 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Mar 7, 2021Updated 4 years ago
- PoC MSVC COFF Object file loader/injector.☆186Mar 19, 2021Updated 4 years ago
- Remove API hooks from a Beacon process.☆283Sep 18, 2021Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- dem sharp donuts☆202Sep 11, 2022Updated 3 years ago
- Cobalt Strike BOF that uses a custom ASM HalosGate & HellsGate syscaller to return a list of processes☆108Mar 8, 2023Updated 2 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- Managed assembly shellcode generation☆280Mar 19, 2021Updated 4 years ago
- Collection of CobaltStrike beacon object files☆105Feb 14, 2022Updated 4 years ago