Using Spotify Playlists as Malware CDN
☆26Feb 1, 2021Updated 5 years ago
Alternatives and similar repositories for c2tify
Users that are interested in c2tify are comparing it to the libraries listed below
Sorting:
- Brute-force script for finding azorult XOR key.☆14May 22, 2019Updated 6 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Siber Yıldız 2020 CTF Soruları ve Çözümleri☆15Dec 28, 2020Updated 5 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 5 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- MBR virus☆25Jun 25, 2021Updated 4 years ago
- 无模块注入工程 VS2008☆11Jul 23, 2018Updated 7 years ago
- Socks 5 proxy☆12Aug 5, 2023Updated 2 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- ☆19Mar 9, 2021Updated 4 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- ☆44Sep 22, 2022Updated 3 years ago
- inject and run code into arbitrary process (x86 and x64)☆14Oct 20, 2021Updated 4 years ago
- A solution to create obfuscated download cradles for PowerShell.☆16Aug 1, 2022Updated 3 years ago
- Winsock accept() Backdoor Implant.☆118Feb 13, 2021Updated 5 years ago
- ☆24Nov 28, 2021Updated 4 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- https://twitch.com/scottsec adresinde yapılan yayınların arşiv, link ve kaynakların bulunduğu repo☆12Feb 1, 2021Updated 5 years ago
- A repository with simple projects created for testing/learning purpose☆46Dec 18, 2025Updated 2 months ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)☆17May 22, 2019Updated 6 years ago
- UI for creating LNKs☆106Jun 16, 2021Updated 4 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆97Sep 26, 2019Updated 6 years ago
- Bare Knuckled AV Breaking☆58Aug 30, 2018Updated 7 years ago
- ☆13Sep 15, 2018Updated 7 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- ☆17Feb 29, 2020Updated 6 years ago