monsieurPale / RSA-BackdoorLinks
Generate backdoored RSA keys using SETUP
☆226Updated last month
Alternatives and similar repositories for RSA-Backdoor
Users that are interested in RSA-Backdoor are comparing it to the libraries listed below
Sorting:
- Execute shellcode via ASPNET compiler☆60Updated 3 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆144Updated 11 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 10 months ago
- Convert your shellcode into an ASCII string☆124Updated 6 months ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆47Updated 3 months ago
- Enumerate active EDR's on the system☆148Updated 3 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Updated 9 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆65Updated 5 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆260Updated 3 months ago
- Obex – Blocking unwanted DLLs in user mode☆278Updated 3 months ago
- Payload encoding utility to effectively lower payload entropy.☆122Updated 9 months ago
- ☆161Updated 7 months ago
- This is practice VM for malware development☆175Updated 2 months ago
- Analyse MSI files for vulnerabilities☆140Updated last year
- Remote DLL Injection with Timer-based Shellcode Execution☆152Updated 5 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆164Updated 5 months ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆159Updated 4 months ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆260Updated 3 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆81Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated last year
- Stage 0☆169Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆88Updated 10 months ago
- ☆164Updated 10 months ago
- The different ways to dump lsass☆204Updated 5 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆356Updated 4 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 3 months ago
- POC of GITHUB simple C2 in rust☆52Updated 5 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆135Updated last year
- ☆163Updated last month