hackerhouse-opensource / AESCryptLinks
AES-256 Microsoft Cryptography API Example Use.
☆33Updated last year
Alternatives and similar repositories for AESCrypt
Users that are interested in AESCrypt are comparing it to the libraries listed below
Sorting:
- ECC Public Key Cryptography☆38Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago
- EvtPsst☆55Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆85Updated 2 months ago
- ☆60Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆54Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- exfiltration/infiltration toolkit☆24Updated last year
- ☆58Updated 11 months ago
- C++ Code to perform a MiniDump of lsass.exe☆35Updated 2 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- A collection of PoCs for different injection techniques on Windows!☆46Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- ☆29Updated last year
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆78Updated 3 years ago
- Create and enumerate hidden desktops.☆88Updated last year
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 10 months ago
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- A pure C version of SymProcAddress☆30Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Updated 2 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆21Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 5 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- A PoC for achieving persistence via push notifications on Windows☆47Updated 2 years ago