H0K5 / Win10PostExploits
post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..
☆12Updated 7 years ago
Related projects: ⓘ
- ☆11Updated this week
- ☆7Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 5 years ago
- ☆12Updated this week
- Windows Malware Probe of Concept☆20Updated 2 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- Execute an arbitrary command within the context of another process☆19Updated 5 years ago
- ☆34Updated this week
- ☆10Updated this week
- ☆10Updated this week
- ☆11Updated this week
- Access windows machine remotely on HTTP☆12Updated 3 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 6 years ago
- ☆10Updated this week
- Sysprep Volatile Environment LPE (2017)☆13Updated 2 years ago
- Remote PE reflective injection with a simple reflective loader☆28Updated 5 years ago
- ☆27Updated this week
- Malware persistence via COM DLL hijacking. C++ implementation example☆12Updated 2 years ago
- Kernel mode windows NT API logger☆21Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 4 years ago
- Component Services Volatile Environment LPE☆11Updated 2 years ago
- Zerokit server controller☆13Updated 5 years ago
- Process injection via KernelCallbackTable☆14Updated 2 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated last week
- ☆22Updated 8 years ago
- An example of PE hollowing injection technique☆23Updated 5 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 4 years ago
- User-mode part of Zerokit platform☆20Updated 5 years ago
- ☆10Updated this week