NullArray / MaliciousDLLGenLinks
Malicious DLL Generator in Py3
☆26Updated 5 years ago
Alternatives and similar repositories for MaliciousDLLGen
Users that are interested in MaliciousDLLGen are comparing it to the libraries listed below
Sorting:
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Dumping credentials through windbg and pykd☆41Updated last year
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆33Updated 3 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Updated 4 years ago
- AppXSVC Service race condition - privilege escalation☆28Updated 6 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- Python 3 server used to control SK8RAT implant☆36Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Updated last month
- Ransoblin (Ransomware Bokoblin)☆18Updated 4 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- A collection of my presentation materials.☆17Updated last year
- WMI SA stuffs☆30Updated 3 years ago
- Event Data Collector☆37Updated last month
- An async Python client library for Empire's RESTful API☆25Updated last year
- Self-healing RAT utilizing libp2p☆88Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆77Updated 5 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Updated 3 years ago
- The Hunt for Malicious Strings☆13Updated 4 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Updated 4 years ago