d3ranged / sf2
Antivirus Signature Search Toolkit
☆79Updated last year
Alternatives and similar repositories for sf2:
Users that are interested in sf2 are comparing it to the libraries listed below
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated 11 months ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆220Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated last year
- Run Your Payload Without Running Your Payload☆180Updated 2 years ago
- Privileger is a tool to work with Windows Privileges☆136Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆99Updated last year
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆88Updated last year
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆171Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆65Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆55Updated 7 months ago
- Bypass Malware Sandbox Evasion Ram check☆136Updated 2 years ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆107Updated last year
- ☆29Updated last year
- Криптор на шелл-кодах☆10Updated 4 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- using the gpu to hide your payload☆54Updated 2 years ago
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆159Updated last year
- ☆180Updated last year
- User Mode Windows Rootkit☆55Updated last year
- A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering t…☆93Updated last month
- random code snippets, useful for getting started☆116Updated 3 months ago
- A .NET malware loader, using API-Hashing to evade static analysis☆206Updated last year
- Execute shellcode files with rundll32☆190Updated last year
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)