FozzieHi / Ransomware
☆12Updated this week
Related projects: ⓘ
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Updated 7 years ago
- ☆42Updated this week
- ☆75Updated this week
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆88Updated 2 years ago
- ☆27Updated this week
- Bypass UAC by abusing shell protocol handlers☆13Updated 3 years ago
- ☆62Updated this week
- ☆31Updated this week
- ☆21Updated this week
- ☆51Updated this week
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆91Updated 4 years ago
- Software Protector☆18Updated 4 years ago
- Read my blog for more info -☆32Updated 3 years ago
- ☆91Updated this week
- Create a powershell malware loader to run C#.cs code on runtime☆64Updated 5 years ago
- Hollow Process / Dynamic Forking / RunPE injection technique implemented in Python☆50Updated 3 years ago
- Initial Commit of Coresploit☆55Updated 2 years ago
- ☆119Updated this week
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆32Updated 4 years ago
- ☆131Updated this week
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆85Updated 3 years ago
- A small shellcode loader library written in C#☆44Updated 2 years ago
- Powerful script for logical obfuscation of powershell scripts☆27Updated 5 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆113Updated 4 years ago
- ☆34Updated this week
- External C2 Using IE COM Objects☆96Updated 5 years ago
- Detect virtual environment☆59Updated 5 years ago
- How to spoof the command line when spawning a new process from C#.☆100Updated 2 years ago
- ☆39Updated this week
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆67Updated 3 years ago