Souhardya / Catharsis
Raw syscall implementations with Powershell
☆29Updated 5 years ago
Alternatives and similar repositories for Catharsis:
Users that are interested in Catharsis are comparing it to the libraries listed below
- Multipurpose malware framework☆23Updated 3 years ago
- Random stuff☆16Updated 6 years ago
- HEVD exploits☆9Updated 6 years ago
- ☆12Updated 7 years ago
- HTTP BOTNET☆7Updated last year
- using VBS to download and install a powershell malware☆39Updated 5 years ago
- Windows Antivirus Evasion and Memory Injection☆13Updated 3 years ago
- Shortcut Downloader☆11Updated 8 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- Download and loader .NET payload☆35Updated 5 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 5 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated last year
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆14Updated 5 years ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆43Updated 7 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆34Updated 5 years ago
- Simple C# reverse shell with shellcode and process injection☆40Updated 8 years ago
- ☆42Updated 5 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Updated 4 years ago
- C# AV bypass jank☆32Updated 4 years ago
- ☆45Updated 6 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- PoC code from blog☆16Updated 5 years ago
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Updated 8 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated 2 years ago
- medium-rare☆28Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago