augustgl / absintheLinks
MBR virus
ā23Updated 4 years ago
Alternatives and similar repositories for absinthe
Users that are interested in absinthe are comparing it to the libraries listed below
Sorting:
- DarkRats Standalone HVNCā24Updated 3 years ago
- š» Windows 10 Kernel-mode rootkitā32Updated 3 years ago
- Simple little rootkit made in Cā13Updated 4 years ago
- Bypass UAC by abusing shell protocol handlersā14Updated 4 years ago
- A very weird RATā19Updated 3 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.ā15Updated 6 years ago
- Read my blog for more info -ā31Updated 4 years ago
- This script make any windows compatible with RDP connectionā20Updated last month
- ā£ļø Necro Stealer + Web Panelā10Updated 5 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.ā27Updated 6 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.ā20Updated 2 years ago
- Create a powershell malware loader to run C#.cs code on runtimeā66Updated 6 years ago
- Malware persistence via COM DLL hijacking. C++ implementation exampleā13Updated 3 years ago
- Collection of shellcode injection and execution techniquesā17Updated 2 weeks ago
- Loader and RunPE file executerā18Updated 6 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformationā88Updated 4 years ago
- Nice try reading NTDLL from disk, nerd.ā19Updated 3 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.ā40Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pā¦ā34Updated 6 years ago
- Runpe + DInvoke + Syscallā16Updated 4 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ĀÆ\_(ć)_/ĀÆā43Updated 3 years ago
- BitRat Source Codeā42Updated 4 years ago
- Disabling Windows Defender & downloading payloadā21Updated 5 years ago
- Detect virtual environmentā65Updated 6 years ago
- Process Hollowing demonstration & explanationā34Updated 4 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.ā12Updated 5 years ago
- Making Shellcode fully undetectable using uuidā23Updated 4 years ago
- Download and loader .NET payloadā37Updated 5 years ago
- Example of C# heap injector for x64 and x86 shellcodesā14Updated 2 years ago
- An example of PE hollowing injection techniqueā24Updated 6 years ago