d3ranged / sf2Links
Antivirus Signature Search Toolkit
☆82Updated 2 years ago
Alternatives and similar repositories for sf2
Users that are interested in sf2 are comparing it to the libraries listed below
Sorting:
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated 3 months ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆231Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆142Updated 2 years ago
- Privileger is a tool to work with Windows Privileges☆139Updated 2 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 3 years ago
- Cross-platform RAT, written in C☆88Updated 3 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 3 years ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆99Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- A .NET malware loader, using API-Hashing to evade static analysis☆208Updated 2 years ago
- Nim process hollowing loader☆62Updated 5 months ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆111Updated 2 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- Test antiviruses☆12Updated 2 years ago
- POC for frustrating/defeating Malware Analysts☆157Updated 3 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 8 months ago
- (Demo) 3rd party agent for Havoc☆147Updated 2 years ago
- Inject shellcode into a valid BMP/GIF image.☆32Updated 5 years ago
- Криптор на шелл-кодах☆11Updated 5 years ago
- PE obfuscator with Evasion in mind☆214Updated 2 years ago
- ☆107Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆67Updated 2 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆59Updated last month
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆115Updated 2 years ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Updated 4 years ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆109Updated 2 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆74Updated last year
- AMSI Bypass for powershell☆29Updated 3 years ago
- Hellokitty Ransomware Source Code☆18Updated 2 years ago