jakuta-tech / GhostShell
Malware indetectable, with AV bypass techniques, anti-disassembly, etc.
☆90Updated 4 years ago
Alternatives and similar repositories for GhostShell:
Users that are interested in GhostShell are comparing it to the libraries listed below
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆89Updated last year
- Convert shellcode generated using pe_2_shellcode to cdb format.☆96Updated 3 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆135Updated 3 years ago
- ☆71Updated 3 years ago
- Encrypting shellcode to Bypass AV☆72Updated 6 years ago
- Cobalt Strike BOF Files with Nim!☆84Updated 2 years ago
- Custom Cobalt Strike stagers using different methods of thread execution and memory allocation☆106Updated 4 years ago
- my learning case about windows☆21Updated 3 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆113Updated 4 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆122Updated 3 years ago
- JScript RAT☆99Updated 4 years ago
- Windows NTLM Authentication Backdoor☆233Updated last month
- Injects shellcode into remote processes using direct syscalls☆74Updated 4 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆89Updated 4 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆106Updated 3 years ago
- Injects HTML/PHP/ASP to the PE☆98Updated 4 years ago
- Converts exe to shellcode.☆102Updated last year
- WIP shellcode loader in nim with EDR evasion techniques☆209Updated 2 years ago
- Windows Defender ShellCode Execution Bypass☆128Updated 5 years ago
- CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day☆48Updated 3 years ago
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆62Updated 10 months ago
- Process Ghosting Tool☆169Updated 3 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 2 years ago
- POC tool to convert CobaltStrike BOF files to raw shellcode☆187Updated 3 years ago
- Weaponizing for privileged file writes bugs with PrintNotify Service☆134Updated 2 years ago
- User Mode Windows Rootkit☆57Updated last year
- ☆67Updated last year
- Reflective DLL Injection with obfuscated (XOR) shellcode☆73Updated 4 years ago
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 2 years ago