IntelBroker / Endurance-WiperLinks
a small wiper malware programmed in c#
☆58Updated 2 years ago
Alternatives and similar repositories for Endurance-Wiper
Users that are interested in Endurance-Wiper are comparing it to the libraries listed below
Sorting:
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- Bypass Malware Time Delays☆102Updated 2 years ago
- ☆85Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- ☆16Updated 3 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆62Updated last year
- Red Team Operation's Defense Evasion Technique.☆53Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- Nim process hollowing loader☆57Updated 11 months ago
- ☆37Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- Files related to works published in Black Mass☆10Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 8 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆95Updated 9 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- A command and control framework.☆52Updated 6 months ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆58Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- ☆59Updated last year
- RDLL for Cobalt Strike beacon to silence sysmon process☆89Updated 2 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated 2 years ago
- EvtPsst☆55Updated last year
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year