mutur4 / Linux-Malware
A project for building Linux && IoT Malware for fun and no-profit
☆16Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for Linux-Malware
- ☆82Updated 2 years ago
- ☆54Updated 7 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆43Updated 6 months ago
- ☆24Updated last year
- ☆25Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- PowerShell Reverse Shell☆61Updated last year
- Construct the payload at runtime using an array of offsets☆58Updated 4 months ago
- Encodes a payload within a generated mock-CSS file☆55Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆92Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆77Updated 10 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆47Updated 8 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- PhantomsGate: Advanced Shellcode Injection Technique☆24Updated 3 months ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆81Updated 7 months ago
- Command and Control (C2) framework☆121Updated 7 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆51Updated 4 months ago
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆31Updated 7 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆146Updated 6 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆45Updated 6 months ago
- Red Team Operation's Defense Evasion Technique.☆51Updated 5 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆53Updated 6 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Malicious powershell scripts loader designed to avoid detection.☆36Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆113Updated 4 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆83Updated 9 months ago