moom825 / XenoStealerLinks
☆49Updated last year
Alternatives and similar repositories for XenoStealer
Users that are interested in XenoStealer are comparing it to the libraries listed below
Sorting:
- MacOS Stealer written in Rust. For Legal and Ethical Research Purposes Only.☆26Updated 11 months ago
- Ransomware written in go, encrypt - decrypt.☆30Updated 7 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- A unique introduction to native runtime obfuscation.☆74Updated 9 months ago
- Troll TaskManager, and play with it .☆28Updated 4 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27Updated 7 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆61Updated 6 months ago
- The best powershell obfuscator ever made☆119Updated 4 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆161Updated 6 months ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆80Updated 5 months ago
- Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.☆72Updated this week
- Windows AppLocker Driver (appid.sys) LPE☆69Updated last year
- A rework of CMLuaUtil AutoElevated☆27Updated 3 years ago
- EDR & AV Bypass Arsenal— a comprehensive collection of tools, patches, and techniques for evading modern EDR and antivirus defenses.☆46Updated 3 weeks ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago
- Good CLR Host with Native patchless AMSI Bypass☆98Updated 7 months ago
- Nim process hollowing loader☆60Updated 4 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆60Updated 7 months ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆84Updated last year
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 7 months ago
- PandaCrypter is a C#-based tool designed to convert PowerShell scripts into obfuscated batch files (.bat) with encryption and additional …☆40Updated 3 months ago
- ☆26Updated last year
- Windows C++ Implant for Exploration C2☆44Updated last week
- Prevent in-process process termination by patching exit APIs☆62Updated last month
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆70Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆88Updated 7 months ago
- Unhook Ntdll.dll, Go & C++.☆32Updated 7 months ago
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆50Updated 6 months ago
- ☆12Updated last year
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year