FarghlyMal / leaked_src
some leaked src code for known and unknown malwares
☆16Updated this week
Alternatives and similar repositories for leaked_src:
Users that are interested in leaked_src are comparing it to the libraries listed below
- ☆54Updated 5 months ago
- ☆28Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆41Updated 8 months ago
- in-process powershell runner for BRC4☆45Updated last year
- POC of GITHUB simple C2 in rust☆54Updated 2 months ago
- malleable profile generator GUI for Havoc☆56Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 10 months ago
- Unix Process hollowing in rust☆21Updated 3 months ago
- Docker container for running CobaltStrike 4.10☆36Updated 6 months ago
- ☆47Updated 2 years ago
- A pure C version of SymProcAddress☆26Updated last year
- A simple rpc2socks alternative in pure Go.☆28Updated 8 months ago
- ☆20Updated 3 weeks ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆30Updated last year
- ☆48Updated last year
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago
- Situational Awareness script to identify how and where to run implants☆49Updated 3 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- BOF for C2 framework☆40Updated 4 months ago
- ☆41Updated 8 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- ☆28Updated this week
- Some of the presentations, workshops, and labs I gave at public conferences.☆30Updated 6 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆35Updated last year
- DFSCoerce exe revisited version with custom authentication☆38Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆19Updated this week
- ☆28Updated 10 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆21Updated 2 months ago
- Section-based payload obfuscation technique for x64☆59Updated 7 months ago