d3ranged / sf2Links
Antivirus Signature Search Toolkit
☆80Updated 2 years ago
Alternatives and similar repositories for sf2
Users that are interested in sf2 are comparing it to the libraries listed below
Sorting:
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated 3 weeks ago
- Privileger is a tool to work with Windows Privileges☆137Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆138Updated 2 years ago
- Криптор на шелл-кодах☆11Updated 5 years ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆229Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated 2 years ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆108Updated 2 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Updated 4 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆83Updated 5 months ago
- A .NET malware loader, using API-Hashing to evade static analysis☆207Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆40Updated 4 years ago
- PE obfuscator with Evasion in mind☆213Updated 2 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆113Updated 2 years ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆104Updated 2 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- ☆108Updated 2 years ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆102Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Test antiviruses☆12Updated last year
- Cross-platform RAT, written in C☆87Updated 3 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- Bypass Malware Time Delays☆104Updated 3 years ago
- Tool to retrieve Config from Redline C2 servers☆16Updated 2 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆57Updated 3 weeks ago