IntelBroker / Endurance-Wiper
a small wiper malware programmed in c#
☆50Updated 2 years ago
Alternatives and similar repositories for Endurance-Wiper:
Users that are interested in Endurance-Wiper are comparing it to the libraries listed below
- This is a simple example of DLL hijacking enabling proxy execution.☆65Updated last year
- Token Elevation to authorized user as SYSTEM or Domain Admins☆24Updated last year
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆32Updated 2 years ago
- ☆15Updated 3 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆58Updated last year
- Situational Awareness script to identify how and where to run implants☆43Updated last month
- malleable profile generator GUI for Havoc☆56Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆44Updated last year
- ☆66Updated 11 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- Small project to facilitate creation of .lnk payloads☆62Updated 2 years ago
- ☆58Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 8 months ago
- Bypass Malware Time Delays☆100Updated 2 years ago
- IAT Unhooking proof-of-concept☆29Updated 9 months ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆83Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆20Updated 2 years ago
- PoC-Malware-TTPs☆49Updated last year
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- ☆29Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆21Updated last year
- Red Team Operation's Defense Evasion Technique.☆52Updated 7 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 8 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆41Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- Tool to retrieve Config from Redline C2 servers☆16Updated last year
- A Bumblebee-inspired Crypter☆80Updated 2 years ago