abdulkadir-gungor / ZIPtoMalwareLinks
It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executable or payload in the zip/rar file without any action. In this way, it can be triggered and run by documents in the compressed file or in the same folder. The second method encrypts the executable file or payloaβ¦
β46Updated 3 years ago
Alternatives and similar repositories for ZIPtoMalware
Users that are interested in ZIPtoMalware are comparing it to the libraries listed below
Sorting:
- π§ C# UAC Bypass technique using mock directories π§β27Updated 3 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of courseβ28Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10β37Updated 2 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.β51Updated 4 years ago
- Malware Libraries focused in help Malware Developmentβ24Updated 2 years ago
- AMSI Bypass for powershellβ30Updated 3 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Pβ¦β16Updated 3 years ago
- β17Updated 6 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagementβ66Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.β16Updated 5 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macroβ¦β25Updated 3 years ago
- Making Shellcode fully undetectable using uuidβ23Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.β36Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β20Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β34Updated 6 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.β32Updated 2 years ago
- Poc of using youtube comments for C2 communicationsβ10Updated 4 years ago
- web based c2 π΄ββ οΈβ14Updated last year
- Trojan written in C++ for Windowsβ18Updated last year
- Google Chrome Cookies Stealer. Steals Chrome cookiesβ44Updated last year
- Hellokitty Ransomware Source Codeβ16Updated last year
- β29Updated last year
- Simple keylogger written in C# which is ready for modifications.β14Updated 4 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.β42Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLLβ30Updated 3 years ago
- This script make any windows compatible with RDP connectionβ20Updated last month
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.β41Updated 4 months ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"β40Updated 4 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secuβ¦β43Updated last year
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keysβ31Updated 2 years ago