Made a sample fileless malware which could cause potential harm if used correctly.
☆19Dec 9, 2023Updated 2 years ago
Alternatives and similar repositories for Fileless-Malware
Users that are interested in Fileless-Malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- ☆17May 15, 2023Updated 2 years ago
- 这是一个shellcode简单的示例demo,使目标exe程序转换为shellcode可执行程序的一个demo【并不打算后期维护】,两年前写的,我发现被工作磨平了 对技术的探索,今天翻到发现的。☆11Sep 23, 2023Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆23Jan 1, 2023Updated 3 years ago
- Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escap…☆36Aug 13, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A collection of cpuid instruction implementations for anti-vm purposes.☆10Oct 5, 2023Updated 2 years ago
- Putting the Sauce in CyberChef - making CyberChef automatable☆19Feb 18, 2026Updated last month
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- 🐞 A simple Windows x86 debugging framework written in C++20 that supports software breakpoints and hardware breakpoints. It can be used …☆13Mar 30, 2025Updated last year
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆15Apr 26, 2024Updated last year
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Aug 16, 2024Updated last year
- Reverts all changes made to Windows 10 (including disabled Cortana), caused by "Destroy Windows Spying" Tool [DWS_Lite.exe] to default st…☆10Dec 15, 2017Updated 8 years ago
- Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included☆69Feb 22, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 使CMD能够高速调用API☆12Aug 27, 2018Updated 7 years ago
- Core Submodule of Exploration C2☆25Jan 27, 2026Updated 2 months ago
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- Terminal user inferface toolkit☆24Nov 4, 2025Updated 5 months ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- Implementation of several code injection techniques.☆24Mar 12, 2022Updated 4 years ago
- replace the shellcode chatacters so that reduce the entropy☆18Sep 14, 2023Updated 2 years ago
- ☆19Dec 30, 2023Updated 2 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Feb 20, 2021Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Evaluation of packer type estimation/detection tools☆14Mar 24, 2021Updated 5 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- ☆22Apr 23, 2024Updated last year
- B.tech Cryptogaphy Final Year Project on ENCRYPTION & DECRYPTION of IMAGE through Triple DES.☆61Aug 13, 2022Updated 3 years ago
- poxyran's blog☆13Aug 27, 2020Updated 5 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- PoC arbitrary WPM without a process handle☆20Jul 22, 2023Updated 2 years ago
- Material for a training on AI tools☆18Feb 3, 2026Updated 2 months ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago
- 内网横向,域相关☆27Oct 17, 2024Updated last year
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- ☆31Jan 28, 2020Updated 6 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- ☆15Mar 24, 2016Updated 10 years ago
- ☆31Dec 19, 2024Updated last year