marcusbotacin / Dropper
Embed an executable as a PE resource, drops and launches it in runtime.
☆57Updated 3 years ago
Alternatives and similar repositories for Dropper:
Users that are interested in Dropper are comparing it to the libraries listed below
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated last year
- ☆95Updated 3 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆61Updated 2 years ago
- ☆36Updated last month
- Random CVEs☆30Updated last year
- Windows (ShadowMove) Socket Duplication☆82Updated 4 years ago
- Windows API Hashes used in the malwares☆41Updated 9 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆114Updated 8 months ago
- ☆51Updated 5 months ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆105Updated last month
- ☆22Updated 10 months ago
- API Hammering with C++20☆45Updated 2 years ago
- Detect strange memory regions and DLLs☆181Updated 3 years ago
- A post-exploitation toolkit to simulate the weaponization and detection of native Windows binaries based on LOLBas framework.☆25Updated last year
- Recreating and reviewing the Windows persistence methods☆37Updated 3 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated 10 months ago
- Finding secrets in kernel and user memory☆115Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- ☆67Updated 2 years ago
- ☆112Updated 2 years ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆54Updated 2 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆122Updated 3 years ago
- ☆28Updated 3 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆74Updated 3 years ago
- Experiment on reproducing Obfuscate & Sleep☆143Updated 4 years ago
- Powershell script deobfuscation using AST in Python☆65Updated last year
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆99Updated 3 years ago
- The AMSI server for Avred☆29Updated last year
- Small PoC of using a Microsoft signed executable as a lolbin.☆136Updated 2 years ago