mutur4 / Linux-Malware
A project for building Linux && IoT Malware for fun and no-profit
☆16Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for Linux-Malware
- ☆82Updated 2 years ago
- ☆55Updated 7 months ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆43Updated 6 months ago
- IAT Unhooking proof-of-concept☆28Updated 7 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆92Updated last year
- Just another C2 Redirector using CloudFlare.☆78Updated 6 months ago
- Command and Control (C2) framework☆121Updated 7 months ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆82Updated 7 months ago
- Encodes a payload within a generated mock-CSS file☆55Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆85Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆145Updated 11 months ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆43Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆45Updated 8 months ago
- PowerShell Reverse Shell☆61Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆147Updated 6 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆69Updated 9 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- A C2 framework built for my bachelors thesis☆53Updated 3 weeks ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆43Updated 4 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆95Updated last year
- vulnlab.com reaper writeup☆26Updated last year
- ☆51Updated 9 months ago
- Brief writeup of post exploitation methodologies.☆17Updated last year
- Automated .NET AppDomain hijack payload generation☆113Updated 4 months ago