Tiangewang0524 / Unimelb-Mobile-Computing-Systems-Programming-COMP90018-
☆8Updated 5 years ago
Related projects: ⓘ
- Resources, tools about .net reverse engineering.☆79Updated 4 years ago
- PoC for hiding processes from Windows Task Manager by manipulating the graphic interface☆40Updated 4 years ago
- HVNC using virtual desktop☆8Updated 3 years ago
- inject or convert shellcode to PE☆38Updated 4 years ago
- ☆85Updated 4 years ago
- StringEncrypt allows you to encrypt strings and files using a randomly generated algorithm, generating a unique decryption code (so-calle…☆18Updated last year
- Conti Ransomware malware leak WITH LOCKER☆20Updated 2 years ago
- A Windows lightweight RAT written in C++☆9Updated 4 years ago
- A windows kernel-mode rootkit with remote control☆11Updated 2 years ago
- decrypt all of the wifi key from Old and Current interface Profile in Windows☆10Updated 4 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Updated 3 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆8Updated 3 years ago
- Powerful script for logical obfuscation of powershell scripts☆27Updated 5 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆27Updated 5 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆16Updated 3 years ago
- LPE exploit for a UAF in Windows (CVE-2021-40449).☆39Updated 2 years ago
- ☆8Updated 4 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆18Updated 5 years ago
- Execute .Net assemblies using Rundll32.exe☆110Updated 3 years ago
- XOR crypt/decrypt using C#☆12Updated 3 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆10Updated 3 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆50Updated 3 years ago
- Anti-VM, malware sandbox detection and evasion.☆14Updated 2 years ago
- Akame is an open-source, UD shellcode loader written in C++17.☆19Updated 2 months ago
- Process Hollowing demonstration & explanation☆31Updated 3 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Updated 5 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆52Updated 2 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 3 years ago
- ☆27Updated this week
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- A dynamic confuserex unpacker that relies on invoke for most things☆63Updated 7 years ago