post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..
☆14Aug 31, 2017Updated 8 years ago
Alternatives and similar repositories for Win10PostExploits
Users that are interested in Win10PostExploits are comparing it to the libraries listed below
Sorting:
- Simple RAT (only on own network) made in C++☆19Mar 11, 2013Updated 13 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆18Sep 7, 2019Updated 6 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- a "process-less" trojan☆12May 9, 2020Updated 5 years ago
- ☆10Nov 11, 2020Updated 5 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆13Aug 29, 2016Updated 9 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆14Oct 2, 2019Updated 6 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- ☆15Aug 23, 2020Updated 5 years ago
- Decompile an x86 exe, and read PE infos.☆19Sep 29, 2018Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Nov 26, 2016Updated 9 years ago
- Скрытие Win API☆27Aug 14, 2019Updated 6 years ago
- Collection of windows rootkits☆29Jun 4, 2020Updated 5 years ago
- ☆65Nov 12, 2022Updated 3 years ago
- Infects PE files with a shellcode☆22Oct 20, 2018Updated 7 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- medium-rare☆28Nov 21, 2019Updated 6 years ago
- RAT - HTTP based. Undetectable!☆52Dec 13, 2019Updated 6 years ago
- Get/dump chrome and firefox saved passwords.☆20Sep 13, 2020Updated 5 years ago
- Compiled and bundled devtools frontend for easy consuming☆10Aug 12, 2025Updated 7 months ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- ☆40Apr 23, 2018Updated 7 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- Node.JS 14 Apple Silicon (arm64) Unofficial Build for Apple Silicon☆14Dec 27, 2024Updated last year
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- Saurik remote control software opensource, X30 is now available.☆37Oct 17, 2022Updated 3 years ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 5 months ago
- ☆25Apr 30, 2012Updated 13 years ago