SaashaJoshi / operating-systemLinks
Operating System: CPU Scheduling Algorithms
☆10Updated 5 years ago
Alternatives and similar repositories for operating-system
Users that are interested in operating-system are comparing it to the libraries listed below
Sorting:
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Updated 7 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Updated 7 years ago
- PoC code from blog☆16Updated 5 years ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13Updated 3 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Updated 5 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Updated 2 years ago
- Configurable, Community driven, HTTP C2 Profile☆27Updated 8 months ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 4 years ago
- Another Portable Executable files analysing stuff☆21Updated 14 years ago
- Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)☆17Updated 6 years ago
- The Hunt for Malicious Strings☆13Updated 5 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 5 years ago
- Various Crypter Project☆10Updated 11 years ago
- AppXSVC Service race condition - privilege escalation☆29Updated 6 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Updated 5 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Updated 7 months ago
- Spoof parent process ID☆13Updated 7 years ago
- Code that can be used as a reference, library, or inspiration for hacking Windows memory.☆53Updated 5 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Updated 2 years ago
- Citrix Phishlet☆24Updated 5 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Updated 5 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 7 years ago
- A service container for interacting with SRA's VECTR☆15Updated 10 months ago
- DarkRats Standalone HVNC☆25Updated 3 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13Updated 2 years ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Updated 6 years ago