SleepTheGod / WindowsLinks
Windows And Ways To Break It
☆99Updated last year
Alternatives and similar repositories for Windows
Users that are interested in Windows are comparing it to the libraries listed below
Sorting:
- ☆129Updated this week
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Create and enumerate hidden desktops.☆90Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆71Updated last month
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆64Updated 10 months ago
- ☆105Updated 10 months ago
- Basic reverse shell in C using socket() with complete explanation☆65Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆84Updated 5 months ago
- ☆85Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated 11 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- ☆78Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 9 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆176Updated last year
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆58Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- vulnlab.com reaper writeup☆26Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated last year
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- ☆108Updated 2 years ago
- RegStrike is a .reg payload generator☆58Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆69Updated 4 months ago