IntelBroker / Endurance-Wiper
a small wiper malware programmed in c#
☆53Updated 2 years ago
Alternatives and similar repositories for Endurance-Wiper:
Users that are interested in Endurance-Wiper are comparing it to the libraries listed below
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- ☆16Updated 3 years ago
- malleable profile generator GUI for Havoc☆55Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- ☆59Updated last year
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated last year
- Nim process hollowing loader☆57Updated 8 months ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆29Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆48Updated 11 months ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆62Updated last year
- AMSI Bypass for powershell☆30Updated 3 years ago
- PowerShell script to generate ShellCode in various formats☆41Updated 7 months ago
- ☆34Updated 3 weeks ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- ☆33Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated 11 months ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- Small project to facilitate creation of .lnk payloads☆66Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Situational Awareness script to identify how and where to run implants☆50Updated 4 months ago
- A .NET binary loader that bypasses AMSI☆45Updated 3 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆32Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆100Updated last year
- Red Team Operation's Defense Evasion Technique.☆53Updated 10 months ago
- API Hammering with C++20☆46Updated 2 years ago