JLospinoso / cpp-implant
A simple implant showcasing modern C++
☆101Updated 3 years ago
Related projects: ⓘ
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆218Updated 2 months ago
- Evasive Process Hollowing Techniques☆132Updated 4 years ago
- Managed assembly shellcode generation☆261Updated 3 years ago
- Red Team Operator: Malware Development Essentials Course☆92Updated 4 years ago
- PoC for proxying COM objects when hijacking☆197Updated 5 years ago
- Simple EDR implementation to demonstrate bypass☆152Updated 4 years ago
- ☆124Updated last year
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆161Updated 3 years ago
- ☆131Updated last year
- Conti Locker source code☆178Updated 2 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆157Updated 2 months ago
- Experiment on reproducing Obfuscate & Sleep☆136Updated 3 years ago
- EarlyBird process hollowing technique (BOF) - Spawns a process in a suspended state, inject shellcode, hijack main thread with APC, and e…☆263Updated last year
- Apply a filter to the events being reported by windows event logging☆259Updated 3 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆127Updated last year
- WTSRM☆198Updated 2 years ago
- ☆99Updated this week
- Project to check which Nt/Zw functions your local EDR is hooking☆179Updated 3 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆65Updated 2 years ago
- A shellcode function to encrypt a running process image when sleeping.☆329Updated 3 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆213Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- Building and Executing Position Independent Shellcode from Object Files in Memory☆154Updated 3 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆86Updated 3 years ago
- A fake AMSI Provider which can be used for persistence.☆134Updated 3 years ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆156Updated last year
- ☆111Updated last year
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆176Updated 2 years ago
- GhostWriting Injection Technique.☆162Updated 6 years ago