Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.
☆17Sep 29, 2018Updated 7 years ago
Alternatives and similar repositories for netstub
Users that are interested in netstub are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- MS17-010 Tester☆13May 20, 2017Updated 8 years ago
- A quick tool for hiding a new process running shellcode.☆57Jun 10, 2020Updated 5 years ago
- Loads shellcode from a resource file.☆22Aug 15, 2019Updated 6 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- Disabling Windows Defender & downloading payload☆21Jul 28, 2020Updated 5 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Load PE via XML Attribute☆31Feb 1, 2020Updated 6 years ago
- C++ Host .NET CLR & Run a assembly directly from ressource (RT_RCDATA) without extraction disk.☆15Mar 18, 2023Updated 3 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆26May 12, 2023Updated 2 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago
- ☆37May 9, 2019Updated 6 years ago
- a very basic proxy obfuscator based on dnlib☆21Jul 3, 2018Updated 7 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆31Nov 9, 2021Updated 4 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Aug 4, 2021Updated 4 years ago
- Overwrites the whole PE Header☆20Apr 20, 2020Updated 5 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- RunPE using Hell's Gate technique.☆32Dec 4, 2020Updated 5 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- ☆73Oct 24, 2021Updated 4 years ago
- Loads .NET Assembly Via CLR Loader☆17Mar 6, 2019Updated 7 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- Malicious Shortcut(.lnk) Generator☆87Nov 23, 2018Updated 7 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆29Aug 5, 2019Updated 6 years ago
- Simple runtime crypter in C++.☆43Dec 8, 2014Updated 11 years ago
- Infects PE files with a shellcode☆22Oct 20, 2018Updated 7 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- A PowerShell script anti-virus evasion tool☆18Jan 3, 2021Updated 5 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago