axe-usat / Example-Crypter
Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.
☆17Updated 8 years ago
Alternatives and similar repositories for Example-Crypter:
Users that are interested in Example-Crypter are comparing it to the libraries listed below
- HTTP BOTNET☆8Updated 2 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 6 years ago
- using VBS to download and install a powershell malware☆41Updated 5 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 6 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆115Updated 4 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆78Updated 6 years ago
- Simple way to read wirte delete values from registry☆18Updated 5 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago
- Attempt at recreating a windows-based DKOM rootkit using c#☆11Updated 8 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- Fileless Ransomware Example☆36Updated 7 years ago
- Various Crypter Project☆51Updated 11 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated last year
- Download a payload and make it run from registry without droppng.☆106Updated 6 years ago
- Simple runtime crypter in C++.☆44Updated 10 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- Simple C# reverse shell with shellcode and process injection☆39Updated 8 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Updated 7 years ago
- Backdoor en powershell vía Telegram☆30Updated 8 years ago
- PoC dlls for Task Scheduler COM Hijacking☆94Updated 8 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26Updated 8 years ago
- Python source random obfuscation☆11Updated 2 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆36Updated 5 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆96Updated 2 years ago
- PowerShell Reverse HTTPs Shell☆27Updated 10 years ago
- Zero-Day Code Injection and Persistence Technique☆26Updated 8 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 5 years ago
- C# code to run shellcode in a sneaky way☆90Updated 4 years ago