ZeroMemoryEx / APT38-0day-StealerLinks
APT38 Tactic PoC for Stealing 0days from security researchers
☆317Updated 3 months ago
Alternatives and similar repositories for APT38-0day-Stealer
Users that are interested in APT38-0day-Stealer are comparing it to the libraries listed below
Sorting:
- ☆331Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆384Updated last year
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆403Updated 2 years ago
- This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp…☆425Updated 2 years ago
- All my Source Codes (Repos) for Red-Teaming & Pentesting + Blue Teaming☆231Updated 11 months ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆288Updated last year
- Awesome AV/EDR/XDR Bypass Tips☆280Updated 2 years ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆229Updated 2 years ago
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆255Updated 10 months ago
- A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.☆207Updated 2 years ago
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆389Updated 2 years ago
- Reflective DLL Injection Made Bella☆237Updated 8 months ago
- Extract C2 Traffic☆251Updated 9 months ago
- 「🛡️」AVs/EDRs Evasion tool☆104Updated 9 months ago
- C++ self-Injecting dropper based on various EDR evasion techniques.☆390Updated last year
- Bypass Malware Sandbox Evasion Ram check☆138Updated 2 years ago
- Performing Indirect Clean Syscalls☆575Updated 2 years ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆150Updated 5 months ago
- My collection of malware dev links☆287Updated 3 months ago
- Leverage a legitimate WFP callout driver to prevent EDR agents from sending telemetry☆433Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆717Updated last month
- ☆362Updated last year
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆178Updated 3 years ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆569Updated last year
- ☆20Updated 8 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆563Updated last month
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆373Updated last year
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆327Updated 4 months ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆423Updated last year
- TartarusGate, Bypassing EDRs☆616Updated 3 years ago