athulck / Fileless-MalwareLinks
Made a sample fileless malware which could cause potential harm if used correctly.
☆13Updated last year
Alternatives and similar repositories for Fileless-Malware
Users that are interested in Fileless-Malware are comparing it to the libraries listed below
Sorting:
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆18Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆110Updated last year
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆17Updated 3 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago
- Simple API Hooks detector☆72Updated 3 years ago
- ☆37Updated 5 months ago
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆38Updated last month
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 5 years ago
- Attack tool for altering packed samples so that they evade static packing detection☆19Updated 7 months ago
- Overwrite MBR and add own custom message☆16Updated 5 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆11Updated 2 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated last year
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆83Updated last month
- Advanced dynamic malware analysis tool.☆84Updated last year
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆45Updated 3 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Updated last month
- A dynamic unpacking tool☆140Updated last year
- using the gpu to hide your payload☆59Updated 3 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated 11 months ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆40Updated 4 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- NT AUTHORITY\SYSTEM☆39Updated 5 years ago
- Simple x86 Trampoline Hook☆41Updated 3 years ago
- Process injection via native Windows APIs (NTAPIs)☆16Updated last year
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year