hideckies / malsrc
A collection of red team techniques.
☆23Updated last month
Alternatives and similar repositories for malsrc:
Users that are interested in malsrc are comparing it to the libraries listed below
- Threadless shellcode injection tool☆63Updated 5 months ago
- ☆78Updated last year
- Create Anti-Copy DRM Malware☆51Updated 5 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆73Updated 3 months ago
- Execute dotnet app from unmanaged process☆68Updated last month
- Using LNK files and user input simulation to start processes under explorer.exe☆24Updated 4 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- ☆36Updated last year
- ☆50Updated last month
- A simple Sleepmask BOF example☆81Updated 4 months ago
- Section-based payload obfuscation technique for x64☆59Updated 5 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆80Updated 2 years ago
- ☆92Updated 4 months ago
- Modified versions of the Cobalt Strike Process Injection Kit☆92Updated last year
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆82Updated last year
- ☆48Updated 3 months ago
- ☆62Updated 11 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆44Updated 3 weeks ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆41Updated 9 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 4 months ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆42Updated last year
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆60Updated last year
- Execute shellcode via Bluetooth device authentication☆29Updated 2 weeks ago
- A basic C2 framework written in C☆59Updated 6 months ago
- ☆45Updated 9 months ago
- TypeLib persistence technique☆103Updated 3 months ago
- Winsocket for Cobalt Strike.☆99Updated last year
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆36Updated 2 weeks ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆56Updated last year