abdulkadir-gungor / ZIPtoMalwareLinks
It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executable or payload in the zip/rar file without any action. In this way, it can be triggered and run by documents in the compressed file or in the same folder. The second method encrypts the executable file or payloaβ¦
β45Updated 3 years ago
Alternatives and similar repositories for ZIPtoMalware
Users that are interested in ZIPtoMalware are comparing it to the libraries listed below
Sorting:
- π§ C# UAC Bypass technique using mock directories π§β27Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.β51Updated 4 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of courseβ28Updated 3 years ago
- Simple keylogger written in C# which is ready for modifications.β14Updated 4 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10β37Updated 2 years ago
- AMSI Bypass for powershellβ30Updated 3 years ago
- β17Updated 6 years ago
- Malware Libraries focused in help Malware Developmentβ23Updated 2 years ago
- Trojan written in C++ for Windowsβ18Updated last year
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagementβ65Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.β20Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Pβ¦β15Updated 3 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.β32Updated 2 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass π±βπ€β13Updated last year
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit tβ¦β28Updated 11 months ago
- Google Chrome Cookies Stealer. Steals Chrome cookiesβ44Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe componentβ11Updated 2 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.β16Updated 5 years ago
- This script make any windows compatible with RDP connectionβ20Updated last month
- Making Shellcode fully undetectable using uuidβ23Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β34Updated 6 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β20Updated 3 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLLβ30Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educatβ¦β92Updated last year
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.β42Updated 2 years ago
- Exploit for the vulnerability null pointer derefrence to in XWorm RATβ13Updated 4 months ago
- π Builder of Malware Loaderβ15Updated 4 years ago
- web based c2 π΄ββ οΈβ14Updated last year
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"β40Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.β50Updated last year