Malware indetectable, with AV bypass techniques, anti-disassembly, etc.
☆110Apr 12, 2020Updated 5 years ago
Alternatives and similar repositories for GhostShell
Users that are interested in GhostShell are comparing it to the libraries listed below
Sorting:
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- Run shellcode through InnoSetup code engine.☆74Jun 22, 2023Updated 2 years ago
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Dec 9, 2020Updated 5 years ago
- Hide your tcp connection!!!☆12Apr 8, 2020Updated 5 years ago
- Another Go Shellcode Loader using Windows APIs☆141Nov 4, 2021Updated 4 years ago
- ☆38Jul 14, 2020Updated 5 years ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆167May 27, 2021Updated 4 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆81Dec 28, 2022Updated 3 years ago
- PoC for hiding PE exports☆67Dec 19, 2020Updated 5 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- A simple AES malware crypter☆16Mar 16, 2018Updated 8 years ago
- Evasive Process Hollowing Techniques☆142Aug 16, 2020Updated 5 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- Process Ghosting Tool☆176Jun 22, 2021Updated 4 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Small and convenient C2 tool for Windows targets☆613Mar 8, 2022Updated 4 years ago
- A polyglot payload generator☆244Aug 15, 2022Updated 3 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- A python metamorphic engine for PE/PE+ files.☆15Jan 1, 2023Updated 3 years ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆23May 24, 2020Updated 5 years ago
- ☆40Apr 23, 2018Updated 7 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆31Nov 9, 2021Updated 4 years ago
- A cross-platform remote administration tool written in Java☆19Aug 26, 2020Updated 5 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆991Oct 7, 2022Updated 3 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- ☆52Dec 11, 2019Updated 6 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 7 years ago
- Injects shellcode into remote processes using direct syscalls☆77Dec 30, 2020Updated 5 years ago
- Simple shellcode obfuscator using PYTHON and C / C++☆74Jun 17, 2020Updated 5 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37May 9, 2015Updated 10 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Nov 13, 2021Updated 4 years ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆118Feb 12, 2026Updated last month
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 5 years ago