IntelBroker / Endurance-Wiper
a small wiper malware programmed in c#
☆45Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Endurance-Wiper
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated last year
- ☆15Updated 3 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated last year
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆28Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆37Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆51Updated 5 months ago
- ☆35Updated 2 weeks ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 4 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆81Updated last year
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 2 years ago
- Small project to facilitate creation of .lnk payloads☆62Updated last year
- ☆33Updated last year
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆39Updated 3 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 2 years ago
- malleable profile generator GUI for Havoc☆56Updated last year
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆19Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 5 months ago
- PoC-Malware-TTPs☆48Updated last year
- Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on t…☆12Updated last year
- RDLL for Cobalt Strike beacon to silence sysmon process☆85Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Let's analyze one of the ways to bypass the smart screen and write our own simple cryptor that runs the shellcode☆48Updated last month
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆36Updated 2 years ago
- ☆63Updated 8 months ago