H0K5 / Win10PostExploitsLinks
post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..
☆14Updated 8 years ago
Alternatives and similar repositories for Win10PostExploits
Users that are interested in Win10PostExploits are comparing it to the libraries listed below
Sorting:
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆17Updated 6 years ago
- Simple little rootkit made in C☆13Updated 4 years ago
- An example of PE hollowing injection technique☆25Updated 6 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- DLL Injection Library & Tools☆73Updated 9 years ago
- Raw syscall implementations with Powershell☆29Updated 6 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Updated 7 years ago
- Execute an arbitrary command within the context of another process☆21Updated 6 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Updated 5 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 6 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- DarkRat source - beware untested source and resources.☆21Updated 6 years ago
- ☆23Updated 9 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- Code that can be used as a reference, library, or inspiration for hacking Windows memory.☆53Updated 5 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Updated 5 years ago
- Sysprep Volatile Environment LPE (2017)☆15Updated 5 months ago
- Various Crypter Project☆54Updated 11 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆28Updated 8 years ago
- ☆37Updated 6 years ago
- ☆13Updated 8 years ago
- ☆14Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 6 years ago
- Automate AV evasion by calling AMSI☆87Updated 2 years ago