cocomelonc / offzone-2024-malware-persistence-workshopLinks
OFFZONE 2024 Malware Persistence workshop
☆22Updated last year
Alternatives and similar repositories for offzone-2024-malware-persistence-workshop
Users that are interested in offzone-2024-malware-persistence-workshop are comparing it to the libraries listed below
Sorting:
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- Windows AppLocker Driver (appid.sys) LPE☆73Updated last year
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 8 months ago
- CVE-2024-30090 - LPE PoC☆108Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆136Updated 5 months ago
- A collection of PoCs to do common things in unconventional ways☆122Updated 5 months ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆156Updated 2 months ago
- Create Anti-Copy DRM Malware☆71Updated last year
- ☆108Updated last year
- POC of GITHUB simple C2 in rust☆52Updated 6 months ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated last year
- ☆41Updated last year
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆129Updated 2 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Updated 7 months ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆27Updated last year
- This repo contains PoCs for vulnerable Windows drivers.☆126Updated last month
- A 64 bit executable junk code engine for polymorphic malware.☆75Updated 7 months ago
- Early Bird APC Injection in Rust☆63Updated last year
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Updated last month
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆81Updated 7 months ago
- Driver Reverse & Exploitation☆82Updated 5 months ago
- BYOVD Technique Example using viragt64 driver☆68Updated last year
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated this week
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆56Updated 7 months ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆23Updated last year
- shell code example☆67Updated 2 months ago
- Section-based payload obfuscation technique for x64☆64Updated last year