jakuta-tech / GhostShell
Malware indetectable, with AV bypass techniques, anti-disassembly, etc.
☆81Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for GhostShell
- Linux x86_64 Process Injection Utility☆58Updated 3 years ago
- Windows NTLM Authentication Backdoor☆235Updated 3 years ago
- ☆38Updated 4 years ago
- A simple C implementation to decoded your shellcode and writes it directly to memory☆94Updated 4 years ago
- ☆70Updated 3 years ago
- Injects shellcode into remote processes using direct syscalls☆74Updated 3 years ago
- Custom Cobalt Strike stagers using different methods of thread execution and memory allocation☆106Updated 4 years ago
- Encrypting shellcode to Bypass AV☆70Updated 5 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆133Updated 2 years ago
- Cobalt Strike BOF Files with Nim!☆84Updated 2 years ago
- my learning case about windows☆21Updated 2 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆186Updated 2 years ago
- CVE-2021-40444☆63Updated 2 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆211Updated 2 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆96Updated 2 years ago
- Neton is a tool for getting information from Internet connected sandboxes☆92Updated last year
- Example code for using named pipe output with beacon ReflectiveDLLs☆110Updated 4 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆100Updated 2 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆104Updated 2 years ago
- Shellcode injection POC using syscalls.☆117Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆83Updated 3 years ago
- Using syscall to load shellcode, Evasion techniques☆26Updated 3 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆86Updated 4 years ago