SkarSys / SkarCrypter
Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus total
☆9Updated 10 months ago
Alternatives and similar repositories for SkarCrypter:
Users that are interested in SkarCrypter are comparing it to the libraries listed below
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆44Updated last year
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆18Updated 6 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆66Updated last year
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated 10 months ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆17Updated 2 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆25Updated 2 years ago
- NanoCore rat stub source code☆34Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆41Updated 9 months ago
- Windows shellcode encoding and encrypting tool☆21Updated 2 years ago
- Remote administration tool with native client☆33Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆43Updated 11 months ago
- PDF Icon File Type Spoofer☆13Updated 7 months ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆81Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆21Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 5 months ago
- A malicous Golang Package☆12Updated 7 months ago
- CHAOS RAT web panel path RCE PoC☆27Updated 10 months ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆38Updated last year
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures …☆33Updated 8 months ago
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆12Updated last year
- Winsocket for Cobalt Strike.☆97Updated last year
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆42Updated 9 months ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆29Updated 2 years ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆45Updated 9 months ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆68Updated last year
- This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the ta…☆13Updated last year
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 2 years ago