Troll TaskManager, and play with it .
☆30Aug 3, 2025Updated 6 months ago
Alternatives and similar repositories for TaskMgr-Troll
Users that are interested in TaskMgr-Troll are comparing it to the libraries listed below
Sorting:
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 9 months ago
- Zero-dependency MCP server implementation.☆59Updated this week
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆34Oct 30, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 11 months ago
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 2 months ago
- A few examples of how to trap virtual memory access on Windows.☆41Dec 18, 2024Updated last year
- NoMoreStealers is a Windows file system minifilter driver that protects sensitive user data from untrusted processes.☆94Nov 7, 2025Updated 3 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27May 13, 2025Updated 9 months ago
- golang decryption poc of the new app bound encryption introduced in chrome version 127.☆22Nov 4, 2024Updated last year
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆21Apr 21, 2025Updated 10 months ago
- Collection of scripts to automate the Malware Analysis process☆32Oct 27, 2025Updated 4 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆62May 16, 2025Updated 9 months ago
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- some leaked src code for known and unknown malwares☆23Aug 15, 2025Updated 6 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54May 12, 2025Updated 9 months ago
- Yet another shellcode loader - but a sneaky one☆25Apr 16, 2025Updated 10 months ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆44Aug 16, 2025Updated 6 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 8 months ago
- RCE through a race condition in Apache Tomcat☆56Dec 21, 2024Updated last year
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- WSUS Unauthenticated RCE☆169Oct 28, 2025Updated 3 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 7 months ago
- .NET assembly loader with patching AMSI and ETW bypass☆31Apr 16, 2025Updated 10 months ago
- NSecSoftBYOVD POC☆56Feb 12, 2026Updated 2 weeks ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆63Jun 23, 2025Updated 8 months ago
- ☆29Oct 19, 2024Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆86Sep 14, 2024Updated last year
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆66Dec 15, 2025Updated 2 months ago
- A rework of CMLuaUtil AutoElevated☆30Nov 6, 2022Updated 3 years ago
- Mockingjay process self injection POC☆44Aug 8, 2023Updated 2 years ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆137Apr 27, 2025Updated 10 months ago
- Plantronics Desktop Hub LPE☆37May 15, 2024Updated last year
- Test AMSI Provider implementation in C#☆42Dec 18, 2024Updated last year
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆217Aug 31, 2025Updated 5 months ago
- Enumerate active EDR's on the system☆150Sep 23, 2025Updated 5 months ago
- A Moodle Scanner☆43Nov 16, 2024Updated last year
- A web application dedicated to write sysmon configuration file☆13Oct 23, 2025Updated 4 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆122Jul 19, 2025Updated 7 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Apr 27, 2025Updated 10 months ago