marcusbotacin / DropperLinks
Embed an executable as a PE resource, drops and launches it in runtime.
☆62Updated 3 years ago
Alternatives and similar repositories for Dropper
Users that are interested in Dropper are comparing it to the libraries listed below
Sorting:
- Compile shellcode into an exe file from Windows or Linux.☆69Updated 2 months ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆107Updated 6 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆119Updated last year
- Finding secrets in kernel and user memory☆116Updated last year
- ☆147Updated 3 years ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆217Updated 3 years ago
- ☆100Updated 3 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆138Updated 2 years ago
- Experiment on reproducing Obfuscate & Sleep☆146Updated 4 years ago
- Windows APT Warfare, published by Packt☆74Updated 2 years ago
- Detect strange memory regions and DLLs☆185Updated 3 years ago
- Deleting Shadow Copies In Pure C++☆114Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆48Updated last year
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆64Updated 2 years ago
- Bypass Malware Time Delays☆103Updated 2 years ago
- It's pointy and it hurts!☆126Updated 2 years ago
- Kernel Mode Driver for Elevating Process Privileges☆132Updated 2 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆103Updated 3 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago
- ☆52Updated 10 months ago
- ETW based POC to identify direct and indirect syscalls☆188Updated 2 years ago
- GhostWriting Injection Technique.☆179Updated 7 years ago
- Piece of code to detect and remove hooks in IAT☆64Updated 3 years ago
- ☆74Updated last year
- ☆28Updated 3 years ago
- Windows LPE exploit for CVE-2022-37969☆136Updated 2 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆163Updated 2 years ago
- ☆114Updated 2 years ago
- ☆113Updated 3 years ago
- Random CVEs☆32Updated 3 months ago