d3ranged / sf2Links
Antivirus Signature Search Toolkit
☆81Updated 2 years ago
Alternatives and similar repositories for sf2
Users that are interested in sf2 are comparing it to the libraries listed below
Sorting:
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- Privileger is a tool to work with Windows Privileges☆136Updated 2 years ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆92Updated 8 months ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- Remote Shellcode Injector☆217Updated last year
- Run Your Payload Without Running Your Payload☆182Updated 2 years ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆226Updated 2 years ago
- Generic PE loader for fast prototyping evasion techniques☆234Updated 11 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆129Updated 5 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- Криптор на шелл-кодах☆9Updated 5 years ago
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆23Updated 5 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Yandex browser passwords and credit-cards decryption algorithm☆15Updated 2 months ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆69Updated 2 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆90Updated last year
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆180Updated last year
- random code snippets, useful for getting started☆121Updated 7 months ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆172Updated 2 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆41Updated last year
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆160Updated last year
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)☆142Updated last year
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- simple user-mode Rootkit☆104Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆103Updated last year
- Tool to retrieve Config from Redline C2 servers☆16Updated 2 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering t…☆97Updated 6 months ago