d3ranged / sf2
Antivirus Signature Search Toolkit
☆80Updated 2 years ago
Alternatives and similar repositories for sf2
Users that are interested in sf2 are comparing it to the libraries listed below
Sorting:
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- Privileger is a tool to work with Windows Privileges☆137Updated 2 years ago
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆23Updated 4 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- Run Your Payload Without Running Your Payload☆181Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆225Updated 2 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆103Updated last year
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆170Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆63Updated 3 weeks ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆178Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆90Updated 7 months ago
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)☆141Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆89Updated 11 months ago
- random code snippets, useful for getting started☆120Updated 6 months ago
- using the gpu to hide your payload☆57Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆128Updated 4 months ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆109Updated last year
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆107Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆145Updated 2 years ago
- Generic PE loader for fast prototyping evasion techniques☆231Updated 10 months ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆103Updated last year
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆151Updated 2 months ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆92Updated last year
- Decrypting yandex browser passwords☆19Updated last month
- Kernel Mode Driver for Elevating Process Privileges☆133Updated 2 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak