abdulkadir-gungor / ZIPtoMalwareLinks
It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executable or payload in the zip/rar file without any action. In this way, it can be triggered and run by documents in the compressed file or in the same folder. The second method encrypts the executable file or payloa…
☆45Updated 3 years ago
Alternatives and similar repositories for ZIPtoMalware
Users that are interested in ZIPtoMalware are comparing it to the libraries listed below
Sorting:
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆28Updated 3 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 2 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- Simple keylogger written in C# which is ready for modifications.☆14Updated 3 years ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 3 years ago
- Trojan written in C++ for Windows☆18Updated last year
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- This script make any windows compatible with RDP connection☆19Updated 5 months ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- PoCs of (outdated) privilege escalation vulnerability☆11Updated 6 months ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆32Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- BitRat Source Code☆42Updated 4 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆16Updated 2 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Updated 2 years ago
- Execute Remote Assembly with args passing and with AMSI and ETW patching☆11Updated 2 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆1Updated 2 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆16Updated 4 years ago
- Powerfull scripts to bypass windows defender☆9Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago