SleepTheGod / WindowsLinks
Windows And Ways To Break It
☆100Updated 2 years ago
Alternatives and similar repositories for Windows
Users that are interested in Windows are comparing it to the libraries listed below
Sorting:
- ☆141Updated last month
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Create and enumerate hidden desktops.☆88Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆110Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 10 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆78Updated last year
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- ☆106Updated last year
- A C2 framework built for my bachelors thesis☆55Updated last month
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆98Updated last month
- Basic reverse shell in C using socket() with complete explanation☆68Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- ☆94Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Updated 2 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆93Updated last year
- MalDev & AV-EDR Evasion for Pentesters☆20Updated 2 years ago
- ☆163Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 9 months ago
- hiding in plain sight: part 2☆45Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆58Updated 3 months ago
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Updated 2 years ago
- Offensive Lua.☆221Updated last month
- ☆85Updated 3 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Updated 2 years ago
- AES-256 Microsoft Cryptography API Example Use.☆35Updated 2 years ago