IntelBroker / Endurance-WiperLinks
a small wiper malware programmed in c#
☆59Updated 3 years ago
Alternatives and similar repositories for Endurance-Wiper
Users that are interested in Endurance-Wiper are comparing it to the libraries listed below
Sorting:
- This is a simple example of DLL hijacking enabling proxy execution.☆67Updated 2 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- ☆84Updated 3 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- Nim process hollowing loader☆62Updated 5 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆99Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- Red Team Operation's Defense Evasion Technique.☆56Updated last year
- ☆33Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- ☆107Updated 2 years ago
- ☆61Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆87Updated 3 weeks ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆67Updated 2 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- malleable profile generator GUI for Havoc☆54Updated 2 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆25Updated last month
- ☆33Updated 2 years ago
- ☆43Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆62Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- ☆16Updated 4 years ago
- EvtPsst☆55Updated 2 years ago
- Compile shellcode into an exe file from Windows or Linux.☆70Updated 6 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Updated last year