A simple XLL, showing how to create an XLL from scratch.
☆50Jan 6, 2016Updated 10 years ago
Alternatives and similar repositories for HelloWorldXll
Users that are interested in HelloWorldXll are comparing it to the libraries listed below
Sorting:
- Simple little rootkit made in C☆13Feb 15, 2021Updated 5 years ago
- Similar to server sided variables and used to download files without giving away a direct download URL.☆17Dec 1, 2020Updated 5 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- Code Exec via Excel☆89Jul 31, 2017Updated 8 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- slides and papers from (or partly from) Bonan☆22Mar 8, 2024Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- PoC for CVE-2022-23940☆12May 7, 2025Updated 9 months ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Dec 11, 2023Updated 2 years ago
- Remote Administration Tool For Windows VB.NET☆12Mar 19, 2019Updated 6 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- 使用Go语言开发的Linux权限审计工具☆13Jun 15, 2022Updated 3 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Jun 5, 2022Updated 3 years ago
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago
- 域前置版本FRP☆16Nov 24, 2022Updated 3 years ago
- go实现的各种字符串匹配算法☆18Jun 21, 2017Updated 8 years ago
- XLL Phishing Tradecraft☆439May 24, 2022Updated 3 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- ☆13Oct 20, 2021Updated 4 years ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆40Oct 6, 2021Updated 4 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- x64dbg scripts for finding OEP of packers☆15Oct 22, 2018Updated 7 years ago
- Command line Remote Access tool (RAT) targeting Windows Systems.☆16Sep 16, 2019Updated 6 years ago
- Module for decompressing aPLib compressed data☆17Aug 25, 2022Updated 3 years ago
- Thực tập trung tâm an ninh mạng Viettel☆14Aug 25, 2017Updated 8 years ago
- lz77win sources!lz77 is the compression software for the windows platform.☆24Apr 16, 2019Updated 6 years ago
- ☆17Apr 20, 2022Updated 3 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Nov 1, 2018Updated 7 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Nov 2, 2023Updated 2 years ago
- PoC for hiding PE exports☆67Dec 19, 2020Updated 5 years ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated 3 weeks ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- Invoke-Decoder – A PowerShell script to decode/deobfuscate malware samples☆18Aug 2, 2020Updated 5 years ago
- Decompiled NotPetya File Encryptor Code☆18Aug 23, 2022Updated 3 years ago
- Collection of shellcode injection and execution techniques☆18Aug 21, 2025Updated 6 months ago
- Reverse shell macro using Word VBA☆17Oct 10, 2020Updated 5 years ago
- 扫描常见未授权访问(改)(redis、mongodb、memcached、elasticsearch、zookeeper、ftp、CouchDB、docker、Hadoop)☆15Aug 4, 2020Updated 5 years ago