IntelBroker / Endurance-WiperLinks
a small wiper malware programmed in c#
☆58Updated 2 years ago
Alternatives and similar repositories for Endurance-Wiper
Users that are interested in Endurance-Wiper are comparing it to the libraries listed below
Sorting:
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- Bypass Malware Time Delays☆103Updated 2 years ago
- ☆84Updated 3 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆55Updated last year
- ☆16Updated 3 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated 2 months ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆65Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Updated 11 months ago
- ☆108Updated 2 years ago
- The best powershell obfuscator ever made☆112Updated last month
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- ☆33Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆52Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆43Updated last year
- using the gpu to hide your payload☆59Updated 3 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆54Updated 2 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆24Updated 2 years ago
- Nim process hollowing loader☆59Updated last month
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- ☆60Updated last year
- A C# port of the MinHook API hooking library☆56Updated 2 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- API Hammering with C++20☆49Updated 3 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆110Updated last year