S12cybersecurity / GhostlyHollowingCrypterView external linksLinks
Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum stealth.
☆17Jun 12, 2025Updated 8 months ago
Alternatives and similar repositories for GhostlyHollowingCrypter
Users that are interested in GhostlyHollowingCrypter are comparing it to the libraries listed below
Sorting:
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated 11 months ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆49May 4, 2025Updated 9 months ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆43Aug 16, 2025Updated 5 months ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆25Jul 9, 2025Updated 7 months ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆16Jul 16, 2024Updated last year
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- A Very Cool Process Injector That supports both Shellcode injection and dll injection☆23Sep 22, 2025Updated 4 months ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆26Aug 28, 2025Updated 5 months ago
- A dynamic HTTP/S stager that lets one shellcode loader be reused for different encrypted payloads - no rebuilds.☆19Oct 1, 2025Updated 4 months ago
- Windows Privilege Escalation☆22Jun 7, 2022Updated 3 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- Malware Libraries focused in help Malware Development☆26Mar 20, 2023Updated 2 years ago
- Hellokitty Ransomware Source Code☆18Oct 7, 2023Updated 2 years ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆62May 1, 2023Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Dec 18, 2024Updated last year
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆74Dec 10, 2025Updated 2 months ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆10Jan 4, 2025Updated last year
- ☆35Feb 1, 2026Updated 2 weeks ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆22Oct 9, 2025Updated 4 months ago
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 6 months ago
- Simple HTTP async comms using standard GET/POST requests☆46Feb 5, 2026Updated last week
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Operating System: CPU Scheduling Algorithms☆10Aug 18, 2020Updated 5 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- Telegram scraper for Maltego, allows from an Alias entity to find all forwarded accounts☆11Apr 25, 2023Updated 2 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- NTAPI hook bypass with (semi) legit stack trace☆18May 9, 2023Updated 2 years ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- ☆14May 14, 2022Updated 3 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 4 months ago
- ☆44Apr 27, 2024Updated last year
- Ansible playbook for configuring Kali Linux to personal preferences☆10Oct 5, 2022Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- ☆13Feb 25, 2023Updated 2 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- ☆16Jun 15, 2025Updated 7 months ago
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 2 months ago