SkarSys / SkarCrypter
Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus total
☆9Updated last year
Alternatives and similar repositories for SkarCrypter:
Users that are interested in SkarCrypter are comparing it to the libraries listed below
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆19Updated 8 months ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆51Updated last year
- CHAOS RAT web panel path RCE PoC☆28Updated last year
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 9 months ago
- Simple Shellcode Loader tool☆25Updated last year
- A malicous Golang Package☆14Updated 9 months ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- PDF Icon File Type Spoofer☆14Updated 9 months ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 3 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆69Updated last year
- Remote administration tool with native client☆36Updated last year
- Windows shellcode encoding and encrypting tool☆21Updated 2 years ago
- NanoCore rat stub source code☆35Updated 2 years ago
- Powerful Rat/Botnet written C/C++ and Rust works on Windows, Linux and Mac OS, Android and IOT Devices Central / P2P Architecture. (Proje…☆10Updated 8 months ago
- Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.☆15Updated 3 weeks ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the ta…☆13Updated last year
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆29Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 7 months ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆42Updated 11 months ago
- Custom Python shellcode encryptor and obfuscator☆12Updated last year
- Test antiviruses☆12Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆82Updated 2 years ago
- LNK-Dropper Builder☆22Updated 2 weeks ago
- Ransomware written in go, encrypt - decrypt.☆20Updated 9 months ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆29Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆14Updated 11 months ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Updated 3 years ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆11Updated 9 months ago
- C++ Code to perform a MiniDump of lsass.exe☆34Updated last year