jason-klein / signed-nsis-exe-append-payloadView external linksLinks
Append a custom data payload to a digitally signed NSIS .exe installer
☆24Jan 11, 2023Updated 3 years ago
Alternatives and similar repositories for signed-nsis-exe-append-payload
Users that are interested in signed-nsis-exe-append-payload are comparing it to the libraries listed below
Sorting:
- ☆24May 28, 2021Updated 4 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- My experience using Windows API for offensive purposes☆17Jul 10, 2021Updated 4 years ago
- Antivirus Emulator Fingerprints☆30Oct 12, 2018Updated 7 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- ☆37Dec 27, 2021Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- Various shellcodes☆13Sep 1, 2020Updated 5 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 2 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- d☆14Sep 5, 2025Updated 5 months ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- ☆37May 9, 2019Updated 6 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆41Sep 3, 2020Updated 5 years ago
- .lib file for linking against the NT CRT☆18Mar 18, 2022Updated 3 years ago
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Jul 27, 2021Updated 4 years ago
- ☆16May 15, 2021Updated 4 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- C# wrapper for ligolo☆17Dec 9, 2021Updated 4 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆121Jun 24, 2020Updated 5 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆115Feb 27, 2021Updated 4 years ago
- ☆48Nov 18, 2020Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- A tool for Windows that can make any program work within file-system transactions.☆59Nov 12, 2020Updated 5 years ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 4 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22May 29, 2018Updated 7 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Jun 9, 2021Updated 4 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- Dynamic COFF object loader☆23Jun 29, 2018Updated 7 years ago