georgesotiriadis / MalwareDev
☆84Updated 2 years ago
Alternatives and similar repositories for MalwareDev:
Users that are interested in MalwareDev are comparing it to the libraries listed below
- ☆112Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Command and Control (C2) framework☆124Updated 10 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated last year
- ☆107Updated last year
- Evade EDR's the simple way, by not touching any of the API's they hook.☆84Updated 3 weeks ago
- A C2 framework built for my bachelors thesis☆56Updated 3 months ago
- 「💀」Proof of concept on BYOVD attack☆154Updated 2 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆150Updated 9 months ago
- An interactive shell to spoof some LOLBins command line☆182Updated last year
- My Favorite Offensive Security Scripts☆66Updated last year
- Do some DLL SideLoading magic☆78Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆91Updated 3 years ago
- ☆80Updated 3 months ago
- POC for frustrating/defeating Malware Analysts☆154Updated 2 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆46Updated 9 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆158Updated 2 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- PowerShell Reverse Shell☆61Updated last year
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆46Updated 9 months ago
- ☆164Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated 6 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆118Updated 7 months ago
- Just some random Red Team Scripts that can be useful☆148Updated 7 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆81Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆102Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Slide decks and/or materials from conference presentations☆55Updated 2 years ago
- ☆58Updated 10 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆144Updated 9 months ago