Whitecat18 / Mavoc-Antivirus
A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from system .
☆28Updated 7 months ago
Alternatives and similar repositories for Mavoc-Antivirus:
Users that are interested in Mavoc-Antivirus are comparing it to the libraries listed below
- ☆23Updated 4 months ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆33Updated last year
- Commands and Scripts to attack Linux and Servers☆25Updated 6 months ago
- An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot☆40Updated 3 weeks ago
- ☆34Updated 11 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆53Updated last month
- UAC Bypass using CMSTP in Rust☆25Updated 3 months ago
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- ⚠️ Malware Development training ⚠️☆30Updated last month
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- ☆64Updated 11 months ago
- Make an Linux Kernel rootkit visible again.☆47Updated last month
- ☆103Updated 5 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- Offensive Router for Windows Pivoting☆15Updated 3 weeks ago
- execute PE in memory Filelessly☆32Updated last month
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆33Updated 3 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 9 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆168Updated 3 weeks ago
- ☆37Updated 3 weeks ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆49Updated 10 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆66Updated 5 months ago
- PowerShell script to generate ShellCode in various formats☆42Updated 6 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆73Updated 7 months ago
- A collection of PoCs for different injection techniques on Windows!☆43Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆26Updated last week
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆47Updated 10 months ago