abdulkadir-gungor / ZIPtoMalwareLinks
It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executable or payload in the zip/rar file without any action. In this way, it can be triggered and run by documents in the compressed file or in the same folder. The second method encrypts the executable file or payloa…
☆46Updated 3 years ago
Alternatives and similar repositories for ZIPtoMalware
Users that are interested in ZIPtoMalware are comparing it to the libraries listed below
Sorting:
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆30Updated 3 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 4 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- Poc of using youtube comments for C2 communications☆10Updated 4 years ago
- This script make any windows compatible with RDP connection☆21Updated 2 months ago
- Well, I have created this shit for educational pruposes (I think)☆37Updated 3 years ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆66Updated last year
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Updated 3 years ago
- Trojan written in C++ for Windows☆18Updated last year
- BitRat Source Code☆42Updated 4 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- ☆17Updated 6 years ago
- Malware Libraries focused in help Malware Development☆25Updated 2 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 2 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated 2 weeks ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆45Updated last year
- Cronos Crypter is an simple example of crypter created for educational purposes.☆102Updated last year
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆40Updated 4 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆32Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 3 years ago