cocomelonc / OffensiveCppLinks
This repo contains C/C++ snippets that can be handy in specific offensive scenarios.
☆12Updated last year
Alternatives and similar repositories for OffensiveCpp
Users that are interested in OffensiveCpp are comparing it to the libraries listed below
Sorting:
- BSides Prishtina 2024 Malware Development and Persistence workshop☆98Updated 4 months ago
- ☆37Updated last year
- A bunch of scripts and code i wrote.☆145Updated 11 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Repository to gather the .NET malware I will be developing☆18Updated 6 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆17Updated last year
- Malware?☆74Updated 11 months ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆179Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆83Updated 5 months ago
- Generate an Alphabetical Polymorphic Shellcode☆116Updated last month
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Updated 2 years ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆130Updated 4 months ago
- Activation Context Hijack☆169Updated 2 months ago
- Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.☆21Updated last year
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated last year
- My projects to understand malware development and detection. Use responsibly. I'm not responsible if you cause unauthorised damage to any…☆91Updated 3 months ago
- ☆25Updated 6 months ago
- Injecting DLL into LSASS at boot☆140Updated 5 months ago
- ☆41Updated last year
- Red Team Operation's Defense Evasion Technique.☆55Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆140Updated 8 months ago
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆27Updated 9 months ago
- A PoC for Early Cascade process injection technique.☆194Updated 8 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆52Updated last year
- A unique introduction to native runtime obfuscation.☆73Updated 7 months ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Updated last year
- List of tools to use in the Advance Red Team Operations course from White Knight Labs☆12Updated 9 months ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆44Updated 10 months ago