SilentVoid13 / Silent_Pass
A cross-platform password harvester for known softwares (Chrome / Chromium, Firefox, Internet Explorer / MS Edge, FileZilla)
☆31Updated 10 months ago
Alternatives and similar repositories for Silent_Pass:
Users that are interested in Silent_Pass are comparing it to the libraries listed below
- Server/Client SOCKS5 (RFC 1928) in Reverse mode on Windows☆35Updated 5 years ago
- A Windows lightweight RAT written in C++☆9Updated 4 years ago
- This is a project to receive Base64 data and decode it in process☆15Updated 4 years ago
- Small tool to load shellcodes or PEs to analyze them☆81Updated 6 years ago
- A quick tool for hiding a new process running shellcode.☆56Updated 4 years ago
- Windows Sandbox Framework☆37Updated 3 years ago
- Add export function and convert exe to dll☆25Updated 4 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆30Updated 3 years ago
- ☆36Updated 4 years ago
- The project uses popular anti-virus protection bypass techniques☆12Updated 6 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆27Updated 5 years ago
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆38Updated last year
- A better alternative to RunDLL32☆29Updated 5 years ago
- A ready-made template for a project based on libpeconv.☆43Updated 3 months ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆90Updated 2 years ago
- PE file mapping and manipulation package.☆36Updated 2 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Updated 4 years ago
- APC DLL Injector with NtQueueApcThread and wake up thread support☆42Updated 7 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆56Updated 3 years ago
- RPC Monitor based on The ETW Microsoft-Windows-Rpc provider☆24Updated 4 years ago
- HTTPS GET RAT and Memory Loader☆25Updated 2 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆39Updated 3 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆18Updated 5 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆29Updated 3 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆17Updated 3 years ago
- This is a random process injector, and more injection techniques will be added in the future.☆12Updated 4 years ago
- An example of PE hollowing injection technique☆23Updated 5 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆20Updated 3 years ago
- ☆15Updated 4 years ago
- Position-idependent Windows DLL loader based on ReflectiveDLL project.☆94Updated 6 years ago