NUL0x4C / Ultra
A Small Poc On An Encryption/Decryption Algorithm Used As A File Locker
☆55Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Ultra
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- API Hammering with C++20☆34Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆34Updated last year
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆85Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆19Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆50Updated last year
- Splitting and executing shellcode across multiple pages☆99Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆51Updated last year
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆30Updated 8 months ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆28Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆36Updated 2 years ago
- Just another ntdll unhooking using Parun's Fart technique☆72Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆77Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆88Updated 2 years ago
- ☆46Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated last year
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆58Updated last year
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆51Updated 3 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆37Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆31Updated 2 years ago