cbrnrd / Kumo
A cross-platform remote administration tool written in Java
☆19Updated 4 years ago
Alternatives and similar repositories for Kumo:
Users that are interested in Kumo are comparing it to the libraries listed below
- A quick tool for hiding a new process running shellcode.☆57Updated 4 years ago
- ☆36Updated 4 years ago
- ✔A script that turns off Windows Defender☆23Updated 2 years ago
- Load PE via XML Attribute☆29Updated 5 years ago
- An AV evasion PoC tool☆9Updated 7 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- StenographyShellcodeLoader☆42Updated 4 years ago
- ☆10Updated 4 years ago
- ☆35Updated 4 years ago
- Loads shellcode from a resource file.☆21Updated 5 years ago
- muddyc3_golang☆21Updated 5 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆27Updated 6 years ago
- dll proxying☆55Updated 4 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆29Updated 3 years ago
- Windows shellcode encoding and encrypting tool☆21Updated 2 years ago
- Load the evilDLL from socket connection without touch disk☆16Updated 3 years ago
- ☆13Updated 3 years ago
- Powerful script for logical obfuscation of powershell scripts☆28Updated 5 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆18Updated 5 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆20Updated 2 years ago
- ☆51Updated 5 years ago
- Add export function and convert exe to dll☆25Updated 4 years ago
- Change hash for a signed pe☆15Updated last year
- Postgres Extension to Execute Shellcodes☆14Updated 4 years ago
- Kernel file/process/object tool☆64Updated 3 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Updated 5 years ago
- SqlServer Linked Password Dumper.☆16Updated 7 years ago
- Collection of shellcode injection and execution techniques☆16Updated 3 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆30Updated 5 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆41Updated 2 years ago