Souhardya / Catharsis
Raw syscall implementations with Powershell
☆29Updated 5 years ago
Alternatives and similar repositories for Catharsis:
Users that are interested in Catharsis are comparing it to the libraries listed below
- Multipurpose malware framework☆24Updated 3 years ago
- HTTP BOTNET☆8Updated 2 years ago
- Random stuff☆16Updated 6 years ago
- HEVD exploits☆9Updated 6 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Windows Antivirus Evasion and Memory Injection☆13Updated 3 years ago
- ☆13Updated 8 years ago
- Python 3 server used to control SK8RAT implant☆36Updated 4 years ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- using VBS to download and install a powershell malware☆41Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated last year
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆25Updated 6 years ago
- ☆25Updated 6 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- Simple C# reverse shell with shellcode and process injection☆39Updated 8 years ago
- ☆45Updated 6 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 5 years ago
- few months old but better than nothing☆58Updated 3 years ago
- PoC code from blog☆16Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Updated 5 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 7 months ago
- ☆11Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated 2 years ago