cocomelonc / 2022-05-02-malware-pers-3View external linksLinks
Malware persistence via COM DLL hijacking. C++ implementation example
☆13May 2, 2022Updated 3 years ago
Alternatives and similar repositories for 2022-05-02-malware-pers-3
Users that are interested in 2022-05-02-malware-pers-3 are comparing it to the libraries listed below
Sorting:
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Jun 5, 2022Updated 3 years ago
- Extract Silently WiFi Passwords By Mail & USB☆19Dec 4, 2021Updated 4 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Inject dll to explorer.exe and hide file from process.☆23Apr 24, 2021Updated 4 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- Remote Administration Tool For Windows VB.NET☆12Mar 19, 2019Updated 6 years ago
- ☆30Aug 24, 2025Updated 5 months ago
- Direct syscalls Injection to bypass AV/EDR☆12May 18, 2024Updated last year
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- Runpe + DInvoke + Syscall☆16Jun 18, 2021Updated 4 years ago
- edge --> powerpoint --> remote-file --> shell☆11May 17, 2019Updated 6 years ago
- Joker Botnet Source LEAKED☆10Jun 5, 2021Updated 4 years ago
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year
- ☆14Jun 5, 2019Updated 6 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Sep 3, 2022Updated 3 years ago
- Bypass Malware Time Delays☆108Sep 23, 2022Updated 3 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Sep 6, 2019Updated 6 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆14Sep 29, 2020Updated 5 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Decoder for VMProtect hwids☆17Aug 1, 2022Updated 3 years ago