FarghlyMal / leaked_srcLinks
some leaked src code for known and unknown malwares
☆22Updated last month
Alternatives and similar repositories for leaked_src
Users that are interested in leaked_src are comparing it to the libraries listed below
Sorting:
- POC of GITHUB simple C2 in rust☆53Updated 2 months ago
- ☆58Updated 11 months ago
- .NET tool used to enrich RPC telemetry☆100Updated 3 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆101Updated 6 months ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆87Updated last year
- Section-based payload obfuscation technique for x64☆64Updated last year
- Blog/Journal on how to backdoor VSCode extensions☆74Updated 2 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆56Updated 8 months ago
- Backdooring VSCode Projects☆79Updated 4 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆30Updated 8 months ago
- ☆37Updated 6 months ago
- Windows Administrator level Implant.☆49Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆52Updated last year
- ☆45Updated 3 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆71Updated last year
- ☆59Updated 10 months ago
- A pure C version of SymProcAddress☆30Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- ☆32Updated 3 months ago
- ☆80Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆44Updated last year
- Permanently disable EDRs as local admin☆116Updated 3 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆47Updated 3 months ago
- ☆82Updated last year
- A small How-To on creating your own weaponized WSL file☆118Updated 2 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- Make an Linux Kernel rootkit visible again.☆57Updated 7 months ago
- ☆108Updated 11 months ago
- Convert your shellcode into an ASCII string☆120Updated 3 months ago