SleepTheGod / Windows
Windows And Ways To Break It
☆100Updated last year
Alternatives and similar repositories for Windows:
Users that are interested in Windows are comparing it to the libraries listed below
- ☆126Updated 3 weeks ago
- ☆103Updated 7 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- ☆106Updated last year
- A shellcode injection tool showcasing various process injection techniques☆135Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆85Updated 9 months ago
- ☆69Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 9 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆147Updated 10 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆183Updated last month
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 11 months ago
- Different methods to get current username without using whoami☆174Updated last year
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 8 months ago
- ☆137Updated last year
- Persistent Powershell backdoor tool {😈}☆116Updated 8 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆175Updated last year
- random code snippets, useful for getting started☆120Updated 5 months ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆56Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆75Updated last month
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆104Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆109Updated last year
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆245Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆127Updated 3 months ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆92Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆153Updated last year
- Inject RDPThief into memory with PowerShell.☆62Updated 3 months ago