post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..
☆14Aug 31, 2017Updated 8 years ago
Alternatives and similar repositories for Win10PostExploits
Users that are interested in Win10PostExploits are comparing it to the libraries listed below
Sorting:
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆17Sep 7, 2019Updated 6 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- a "process-less" trojan☆12May 9, 2020Updated 5 years ago
- Simple RAT (only on own network) made in C++☆19Mar 11, 2013Updated 12 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 4 months ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆13Aug 29, 2016Updated 9 years ago
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year
- Скрытие Win API☆27Aug 14, 2019Updated 6 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆14Oct 2, 2019Updated 6 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- ☆15Aug 23, 2020Updated 5 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- My take on the Win10 Task Cleaner UAC bypass.☆19Mar 14, 2019Updated 6 years ago
- ☆40Apr 23, 2018Updated 7 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- ☆25Apr 30, 2012Updated 13 years ago
- Infects PE files with a shellcode☆22Oct 20, 2018Updated 7 years ago
- Get/dump chrome and firefox saved passwords.☆20Sep 13, 2020Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆93May 15, 2021Updated 4 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27May 25, 2022Updated 3 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- ☆65Nov 12, 2022Updated 3 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- an evil chrome extension that steals credentials from form inputs☆28Aug 5, 2020Updated 5 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆60Feb 10, 2017Updated 9 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Project for Alike Backup, a BDR solution for XenServer, XCP-ng, and Hyper-V virtualization platforms☆12Sep 18, 2024Updated last year
- ☆24Feb 21, 2016Updated 10 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆71Mar 13, 2018Updated 7 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆77Jan 30, 2020Updated 6 years ago