abdulkadir-gungor / ZIPtoMalwareLinks
It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executable or payload in the zip/rar file without any action. In this way, it can be triggered and run by documents in the compressed file or in the same folder. The second method encrypts the executable file or payloaβ¦
β45Updated 3 years ago
Alternatives and similar repositories for ZIPtoMalware
Users that are interested in ZIPtoMalware are comparing it to the libraries listed below
Sorting:
- π§ C# UAC Bypass technique using mock directories π§β27Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.β51Updated 4 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of courseβ28Updated 3 years ago
- Simple keylogger written in C# which is ready for modifications.β14Updated 4 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10β37Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.β36Updated 3 years ago
- BitRat Source Codeβ42Updated 4 years ago
- Making Shellcode fully undetectable using uuidβ23Updated 4 years ago
- This script make any windows compatible with RDP connectionβ20Updated last week
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Pβ¦β15Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagementβ65Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macroβ¦β24Updated 3 years ago
- Powerfull scripts to bypass windows defenderβ9Updated 3 years ago
- Malware Libraries focused in help Malware Developmentβ23Updated 2 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"β40Updated 4 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.β13Updated 4 years ago
- AMSI Bypass for powershellβ30Updated 3 years ago
- β17Updated 6 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuzβ¦β34Updated 4 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass π±βπ€β13Updated last year
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.β16Updated 5 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLLβ31Updated 3 years ago
- β16Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.β50Updated last year
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementationβ20Updated 3 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.β32Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β34Updated 6 years ago
- PoCs of (outdated) privilege escalation vulnerabilityβ13Updated 7 months ago
- A Bumblebee-inspired Crypterβ79Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++β35Updated 3 years ago