MultSec / ModulesLinks
Collection of various malware techniques aimed at Windows through MinGW
☆17Updated 11 months ago
Alternatives and similar repositories for Modules
Users that are interested in Modules are comparing it to the libraries listed below
Sorting:
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆91Updated last year
- Malware?☆74Updated 10 months ago
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆82Updated last month
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆76Updated last year
- Code execution/injection technique using DLL PEB module structure manipulation☆157Updated 2 months ago
- Template-based generation of shellcode loaders☆78Updated last year
- Shellcode loader☆91Updated 8 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- API Hammering with C++20☆50Updated 3 years ago
- ☆144Updated 9 months ago
- ☆108Updated 9 months ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆48Updated 3 months ago
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆131Updated last year
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆86Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆102Updated 2 years ago
- "Service-less" driver loading☆158Updated 8 months ago
- A bunch of scripts and code i wrote.☆142Updated 9 months ago
- ☆57Updated 3 months ago
- Early Bird Cryo Injections – APC-based DLL & Shellcode Injection via Pre-Frozen Job Objects☆101Updated 4 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆128Updated last week
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆63Updated last year
- ☆74Updated 6 months ago
- shell code example☆61Updated 2 months ago
- ☆122Updated 6 months ago
- ☆152Updated last year
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83Updated 2 years ago
- Piece of code to detect and remove hooks in IAT☆64Updated 3 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- Activation Context Hijack☆155Updated last week