mastercodeon314 / NugetBackdoorLinks
A framework for backdooring Microsoft Nuget packages.
☆10Updated 2 years ago
Alternatives and similar repositories for NugetBackdoor
Users that are interested in NugetBackdoor are comparing it to the libraries listed below
Sorting:
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- HEVD Exploits for fun and learning.☆15Updated 5 months ago
- ☆30Updated 5 months ago
- Tool for obtaining information about PPL processes☆16Updated last year
- ECC Public Key Cryptography☆37Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago
- Deobfuscation of XorStringsNet☆14Updated last year
- Python3 tool to perform password spraying using RDP☆16Updated 2 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆22Updated last year
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 3 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆40Updated 3 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- ☆27Updated 2 years ago
- ☆11Updated 2 years ago
- ☆17Updated 8 months ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆58Updated 2 years ago
- Modify managed functions from unmanaged code☆53Updated last year
- Playing with packets in C#☆15Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Updated 2 years ago
- ☆20Updated 2 years ago
- A Patchless AMSI Bypass Technique using VEH²☆30Updated 7 months ago
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Updated 2 years ago
- A collection of my presentation materials.☆17Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Updated 9 months ago
- A C# Tool to gather information about email breaches☆16Updated 2 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Updated last year
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago