Maldev-Academy / EmbedPayloadInPng
Embed a payload inside a PNG file
☆282Updated 2 months ago
Alternatives and similar repositories for EmbedPayloadInPng:
Users that are interested in EmbedPayloadInPng are comparing it to the libraries listed below
- EDR & Antivirus Bypass to Gain Shell Access☆232Updated 3 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆312Updated 3 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆212Updated 2 months ago
- ☆280Updated last month
- Extract and execute a PE embedded within a PNG file using an LNK file.☆329Updated 2 months ago
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆346Updated last week
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆541Updated 6 months ago
- yet another AV killer tool using BYOVD☆264Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆254Updated 3 months ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆365Updated 5 months ago
- AV bypass while you sip your Chai!☆212Updated 8 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆335Updated last month
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆149Updated 8 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆159Updated 4 months ago
- ☆333Updated last month
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆501Updated 5 months ago
- Amsi Bypass payload that works on Windwos 11☆374Updated last year
- AV/EDR Lab environment setup references to help in Malware development☆358Updated last month
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆140Updated 7 months ago
- This project steals important data from all chromium and gecko browsers installed in the system and gather the data in a stealer db to be…☆196Updated last month
- PDF dropper Red Team Scenairos☆179Updated 5 months ago
- ☆329Updated last year
- Evasive shellcode loader☆315Updated 3 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆501Updated 7 months ago
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆267Updated last year
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆333Updated this week
- Persistent Powershell backdoor tool {😈}☆111Updated 5 months ago
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆298Updated last week
- Simulate the behavior of AV/EDR for malware development training.☆460Updated 11 months ago