Evi1Grey5 / Bypass-Smartscreen-
Let's analyze one of the ways to bypass the smart screen and write our own simple cryptor that runs the shellcode
☆51Updated last month
Related projects ⓘ
Alternatives and complementary repositories for Bypass-Smartscreen-
- ☆37Updated last month
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- PowerShell script to generate ShellCode in various formats☆39Updated last month
- Lifetime AMSI bypass.☆36Updated 4 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆45Updated 8 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆18Updated 3 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆42Updated 3 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- Source code and examples for PassiveAggression☆54Updated 5 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆22Updated 2 months ago
- Docker container for running CobaltStrike 4.10☆33Updated 2 months ago
- malleable profile generator GUI for Havoc☆56Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆80Updated 9 months ago
- exfiltration/infiltration toolkit☆23Updated 11 months ago
- Windows Administrator level Implant.☆34Updated last month
- ☆58Updated 11 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆40Updated 11 months ago
- Section-based payload obfuscation technique for x64☆58Updated 3 months ago
- A pure C version of SymProcAddress☆23Updated 8 months ago
- Sliver agents for Mythic☆35Updated this week
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 7 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 4 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 4 years ago
- Enumerate the Domain for Readable and Writable Shares☆16Updated 5 months ago
- Construct the payload at runtime using an array of offsets☆58Updated 5 months ago
- PhantomsGate: Advanced Shellcode Injection Technique☆24Updated 4 months ago