Soldie / EquationGroupLeak-tools
β16Updated 5 years ago
Alternatives and similar repositories for EquationGroupLeak-tools:
Users that are interested in EquationGroupLeak-tools are comparing it to the libraries listed below
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.β40Updated 2 years ago
- My implementation of Halo's Gate technique in C#β53Updated 2 years ago
- π§ C# UAC Bypass technique using mock directories π§β29Updated 2 years ago
- Small POC for process ghostingβ39Updated 3 years ago
- One gate to all syscalls!β23Updated 2 years ago
- AMSI Bypass for powershellβ30Updated 2 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file shareβ17Updated 2 years ago
- β21Updated 3 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.β54Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injectorβ30Updated 3 years ago
- Working repo used to experiment with various languages as it relates to offensive security & evasion.β31Updated 8 months ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sysβ49Updated last year
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Pβ¦β15Updated 3 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalationβ21Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe componentβ11Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10β38Updated 2 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.β15Updated 5 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.β61Updated 2 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process holβ¦β67Updated last year
- Simple POC of Voice C2 using Speech Recognitionβ13Updated 2 years ago
- Bypass AMSIβ14Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β19Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.β36Updated 2 years ago
- A simple PE loader.β25Updated 2 years ago
- Create a lnk shortcut file for Windowsβ15Updated 5 years ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!β23Updated 6 months ago
- A python port of CCob's ThreadlessInjectβ25Updated last year
- Windows File Enumeration Intel Gathering Tool.β17Updated last year
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.β13Updated 2 years ago