abdulkadir-gungor / ZIPtoMalwareLinks
It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executable or payload in the zip/rar file without any action. In this way, it can be triggered and run by documents in the compressed file or in the same folder. The second method encrypts the executable file or payloa…
☆46Updated 3 years ago
Alternatives and similar repositories for ZIPtoMalware
Users that are interested in ZIPtoMalware are comparing it to the libraries listed below
Sorting:
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆32Updated 3 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Updated 3 years ago
- Malware Libraries focused in help Malware Development☆27Updated 2 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 4 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- web based c2 🏴☠️☆15Updated last year
- AMSI Bypass for powershell☆29Updated 3 years ago
- Trojan written in C++ for Windows☆19Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆32Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Updated 3 years ago
- BitRat Source Code☆43Updated 5 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆32Updated 4 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- This script make any windows compatible with RDP connection☆21Updated 3 months ago
- Hellokitty Ransomware Source Code☆18Updated 2 years ago
- Poc of using youtube comments for C2 communications☆10Updated 4 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated last year
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆38Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆37Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- ☆16Updated 3 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- HVNC hidden remote VNC desktop with filemanager and backconnect☆44Updated 10 months ago
- WIP Post-exploitation framework tailored for hypervisors.☆51Updated last year
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Updated 4 years ago