moom825 / visualstudio-suo-exploit
This repository is a tool to create a .suo that when run by visual studio's will achieve code execution
☆110Updated last year
Alternatives and similar repositories for visualstudio-suo-exploit
Users that are interested in visualstudio-suo-exploit are comparing it to the libraries listed below
Sorting:
- A .NET malware loader, using API-Hashing to evade static analysis☆207Updated last year
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆104Updated 3 weeks ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆111Updated 4 months ago
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆225Updated 2 years ago
- simple user-mode Rootkit☆104Updated 2 years ago
- PowerShell Obfuscator. A PowerShell script anti-virus evasion tool☆71Updated 6 months ago
- ☆112Updated 6 months ago
- The best powershell obfuscator ever made☆106Updated 3 weeks ago
- Generate Shellcode Loaders & Injects☆155Updated 2 years ago
- Remote Shellcode Injector☆213Updated last year
- Exploitation of echo_driver.sys☆170Updated last year
- Reflective DLL Injection Made Bella☆226Updated 4 months ago
- This repository implements Threadless Injection in C☆166Updated last year
- A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering t…☆95Updated 4 months ago
- Execute shellcode files with rundll32☆199Updated last year
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆160Updated 11 months ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆170Updated 2 years ago
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆160Updated last year
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆190Updated last year
- (0day) Local Privilege Escalation in IObit Malware Fighter☆138Updated last month
- Patching AmsiOpenSession by forcing an error branching☆145Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆89Updated 11 months ago
- .NET assembly loader with patchless AMSI and ETW bypass☆330Updated 2 years ago
- PE obfuscator with Evasion in mind☆212Updated 2 years ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆178Updated last year
- Stealer in c++.☆38Updated 2 weeks ago
- A runtime Crypter written in C++ to bypass AVs signature based detection☆30Updated 2 years ago
- ☆123Updated last year