Winsock accept() Backdoor Implant.
☆119Feb 13, 2021Updated 5 years ago
Alternatives and similar repositories for WSAAcceptBackdoor
Users that are interested in WSAAcceptBackdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 5 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 5 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆109Jan 3, 2021Updated 5 years ago
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A shellcode function to encrypt a running process image when sleeping.☆338Sep 11, 2021Updated 4 years ago
- inject shellcode into remote process via message hook☆15Oct 28, 2020Updated 5 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆168May 27, 2021Updated 4 years ago
- ☆73Oct 24, 2021Updated 4 years ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- A "no frills" 1 class-only, C# .NET command line parser with support for - and / args, switches only, and Name : Values☆34Jan 20, 2026Updated 3 months ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆108Mar 8, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- AMSI Bypass Via the Heap☆107Nov 20, 2020Updated 5 years ago
- Reflective PE packer.☆1,413Feb 22, 2024Updated 2 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆67Jul 10, 2024Updated last year
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Mar 7, 2021Updated 5 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Jul 23, 2020Updated 5 years ago
- Project to check which Nt/Zw functions your local EDR is hooking☆200Mar 21, 2021Updated 5 years ago
- PoC MSVC COFF Object file loader/injector.☆187Mar 19, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Meetuplardan arta kalanlar☆41Aug 18, 2025Updated 8 months ago
- Remove API hooks from a Beacon process.☆283Sep 18, 2021Updated 4 years ago
- PoC for hiding PE exports☆68Dec 19, 2020Updated 5 years ago
- Assembly block for hooking windows API functions.☆95Jul 16, 2019Updated 6 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆121Jun 24, 2020Updated 5 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 6 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆290Mar 8, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 4 years ago
- Userland API Unhooker Project☆111Apr 4, 2026Updated last month
- ☆57Mar 19, 2023Updated 3 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆250Aug 13, 2020Updated 5 years ago
- C# Implementation of the Hell's Gate VX Technique☆217Jun 30, 2020Updated 5 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago