H0K5 / Win10PostExploitsLinks
post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..
☆13Updated 7 years ago
Alternatives and similar repositories for Win10PostExploits
Users that are interested in Win10PostExploits are comparing it to the libraries listed below
Sorting:
- ☆7Updated 6 years ago
- Execute an arbitrary command within the context of another process☆20Updated 6 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Reverse Windows shell over TLS☆19Updated 9 years ago
- Zerokit shared code☆17Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- An example of PE hollowing injection technique☆24Updated 6 years ago
- Access windows machine remotely on HTTP☆12Updated 4 years ago
- Notes and goodies to make binary exploitation life easier☆10Updated 6 years ago
- Component Services Volatile Environment LPE☆12Updated 2 weeks ago
- ☆11Updated 6 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆20Updated 5 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- Windows Malware Probe of Concept☆21Updated 3 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆14Updated 5 years ago
- ☆23Updated 9 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- Zerokit server controller☆14Updated 6 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆28Updated 7 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 5 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 10 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 10 months ago
- Remote PE reflective injection with a simple reflective loader☆31Updated 6 years ago
- Debugger checks in 3 ways☆20Updated 7 years ago
- DarkRat source - beware untested source and resources.☆22Updated 5 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- Analysis and Modification Tool for Executables☆17Updated 6 years ago