moom825 / visualstudio-suo-exploit
This repository is a tool to create a .suo that when run by visual studio's will achieve code execution
☆110Updated last year
Alternatives and similar repositories for visualstudio-suo-exploit:
Users that are interested in visualstudio-suo-exploit are comparing it to the libraries listed below
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆102Updated this week
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆104Updated 2 months ago
- PowerShell Obfuscator. A PowerShell script anti-virus evasion tool☆72Updated 4 months ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆116Updated 2 months ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- Windows Kernel Offensive Toolset☆119Updated 6 months ago
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆222Updated last year
- This repository implements Threadless Injection in C☆161Updated last year
- A .NET malware loader, using API-Hashing to evade static analysis☆208Updated last year
- ☆100Updated 5 months ago
- Remote Shellcode Injector☆212Updated last year
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆172Updated 2 years ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆176Updated last year
- Reflective DLL Injection Made Bella☆221Updated 2 months ago
- Execute shellcode files with rundll32☆193Updated last year
- A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering t…☆93Updated 2 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆94Updated 3 months ago
- Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution☆169Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆59Updated 8 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆88Updated 9 months ago
- Generate Shellcode Loaders & Injects☆155Updated last year
- 「🛡️」AVs/EDRs Evasion tool☆94Updated 3 months ago
- Generic PE loader for fast prototyping evasion techniques☆228Updated 8 months ago
- ☆225Updated 2 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆246Updated last year
- Some POCs for my BYOVD research and find some vulnerable drivers☆182Updated 6 months ago
- A Powershell AMSI Bypass technique via Vectored Exception Handler (VEH). This technique does not perform assembly instruction patching, f…☆157Updated 9 months ago
- Exploitation of echo_driver.sys☆169Updated last year
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆159Updated last year