FarghlyMal / leaked_srcLinks
some leaked src code for known and unknown malwares
☆22Updated 3 months ago
Alternatives and similar repositories for leaked_src
Users that are interested in leaked_src are comparing it to the libraries listed below
Sorting:
- POC of GITHUB simple C2 in rust☆53Updated 5 months ago
- ☆55Updated 8 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆43Updated 11 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆27Updated 5 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆33Updated last year
- ☆34Updated 3 months ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- ☆29Updated last year
- ☆22Updated 4 months ago
- Backdooring VSCode Projects☆74Updated last month
- A pure C version of SymProcAddress☆28Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 10 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆54Updated 5 months ago
- .NET tool used to enrich RPC telemetry☆87Updated last month
- ☆57Updated 8 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 8 months ago
- ☆26Updated 4 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 10 months ago
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆33Updated last week
- AI-based implant feature☆24Updated 2 months ago
- Shellcode Loader using indirect syscalls☆16Updated last year
- Windows Administrator level Implant.☆49Updated 9 months ago
- ☆39Updated 3 weeks ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- ☆38Updated 2 weeks ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated last year
- Reports on Driver, LSASS and other security services mitigations☆24Updated last week
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Windows Protected Process Light toggle tool — dynamically finds offsets and patches EPROCESS using RTCore64☆46Updated 2 months ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year