augustgl / absinthe
MBR virus
ā21Updated 3 years ago
Alternatives and similar repositories for absinthe:
Users that are interested in absinthe are comparing it to the libraries listed below
- A very weird RATā20Updated 2 years ago
- š» Windows 10 Kernel-mode rootkitā31Updated 2 years ago
- Bypass UAC by abusing shell protocol handlersā14Updated 3 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.ā24Updated 4 years ago
- DarkRats Standalone HVNCā23Updated 2 years ago
- ā£ļø Necro Stealer + Web Panelā10Updated 4 years ago
- Read my blog for more info -ā32Updated 3 years ago
- Making Shellcode fully undetectable using uuidā23Updated 3 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.ā21Updated 3 years ago
- ā15Updated 3 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.ā16Updated 6 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.ā12Updated 5 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/systemā11Updated 3 years ago
- Process Hollowing demonstration & explanationā35Updated 3 years ago
- ā23Updated last year
- Nice try reading NTDLL from disk, nerd.ā18Updated 2 years ago
- Disabling Windows Defender & downloading payloadā20Updated 4 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99sā17Updated 3 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.ā18Updated last year
- This script make any windows compatible with RDP connectionā18Updated 3 weeks ago
- Control Panel and Builder (Working)ā9Updated 7 years ago
- This is a project with .net server crypter for bypass AV's Runtime detection.ā11Updated 7 years ago
- Download payload to disk and install it to startup then melt.ā34Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pā¦ā33Updated 5 years ago
- Process injection via KernelCallbackTableā13Updated 3 years ago
- Malware persistence via COM DLL hijacking. C++ implementation exampleā12Updated 2 years ago
- using the Recycle Bin to insure persistenceā12Updated 2 years ago
- Example of C# heap injector for x64 and x86 shellcodesā13Updated 2 years ago
- Create a powershell malware loader to run C#.cs code on runtimeā61Updated 5 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ĀÆ\_(ć)_/ĀÆā42Updated 3 years ago