S12cybersecurity / ExplorerUACStealer
ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++
☆14Updated last year
Related projects: ⓘ
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆13Updated last year
- Malware Libraries focused in help Malware Development☆10Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆19Updated 10 months ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆13Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated last year
- ☆24Updated 10 months ago
- ☆12Updated 2 years ago
- ☆13Updated this week
- ☆9Updated 10 months ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated last year
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- ☆11Updated this week
- C# loader capable of running stage-1 from remote url, file path as well as file share☆14Updated last year
- ☆11Updated 9 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 5 months ago
- Yet, Another Packer/Loader☆25Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆18Updated 7 months ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆16Updated 3 years ago
- Automate Blind SQL Injection with Python.☆19Updated 2 years ago
- ☆21Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆19Updated 7 months ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- ☆16Updated this week
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago
- ☆26Updated this week
- powershell script i wrote that can suspend an arbitrary process (with limits)☆19Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago