guibacellar / BisquillaRansomwareLinks
The evolution of NxRansomware
☆10Updated 6 years ago
Alternatives and similar repositories for BisquillaRansomware
Users that are interested in BisquillaRansomware are comparing it to the libraries listed below
Sorting:
- POC runtime crypter☆9Updated 6 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Updated 6 years ago
- C# Exe that can remotely retrieve C# assemblies for in-memory execution☆19Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆52Updated 6 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42Updated 6 years ago
- ☆12Updated 4 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Updated 6 years ago
- Hide code from dnSpy and other C# spying tools☆42Updated 4 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- How to bypass antivirus 2020☆7Updated 5 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 4 years ago
- ☆36Updated 3 years ago
- Clone running process with ZwCreateProcess☆58Updated 4 years ago
- Hide .Net assembly into png images☆36Updated 5 years ago
- Learning Process Injection and Hollowing techniques☆41Updated 3 years ago
- Simple DLL injector written in C#☆24Updated 9 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 6 years ago
- ☆19Updated 5 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- ☆36Updated 6 years ago
- ☆8Updated 8 months ago
- Inject Frida-Gadget into a local process☆26Updated 6 years ago
- Injection of MSIL using Cecil☆12Updated 9 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Updated 3 years ago
- Bare template for a Kernel Mode Driver☆51Updated 5 years ago
- A simple POC to demonstrate the power of .NET debugging for injection☆72Updated 4 years ago
- Simple c# source code obfuscator☆27Updated 7 years ago
- Remote PE reflective injection with a simple reflective loader☆31Updated 6 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated 2 years ago