malwarekid / Fileless-PE
Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionality to specify a method to execute if the file is a DLL. The script utilizes the pythonmemorymodule library for memory manipulation.
☆23Updated 9 months ago
Alternatives and similar repositories for Fileless-PE:
Users that are interested in Fileless-PE are comparing it to the libraries listed below
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆14Updated 10 months ago
- Social Engineering Browser Update Attack.☆56Updated last year
- An open-source .NET Ransomware☆24Updated 3 years ago
- HID payloads for good purpose☆9Updated 4 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- LNK-Dropper Builder☆22Updated 2 weeks ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Ded Security Framework is a tool aimed at security professionals☆35Updated 11 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆46Updated 8 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆16Updated 8 months ago
- An ADB-based botnet written in C.☆44Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- B-UAC, Windows UAC Bypass Trojan Generator☆8Updated 6 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Updated last year
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated 11 months ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆40Updated 2 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆34Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆21Updated 2 years ago
- fully Undetectable payload generator for metasploit☆11Updated 2 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆11Updated 2 years ago
- Short Programs For Spreading Malware☆15Updated 3 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆39Updated 2 years ago
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆12Updated 2 years ago
- GENERATE PYTHON BASED FUD STUB☆19Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆17Updated 2 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆17Updated 2 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆49Updated 3 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago