n1nj4sec / pymemimporter
import pyd or execute PE all from memory using only pure python code and some shellcode tricks
☆73Updated 7 years ago
Related projects: ⓘ
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆108Updated 3 years ago
- Windows Reverse Shell shellcode☆60Updated 2 years ago
- ☆85Updated this week
- ☆76Updated this week
- ☆86Updated this week
- ☆62Updated this week
- A repository of some of my Windows 10 Device Guard Bypasses☆133Updated 7 years ago
- ☆43Updated 5 years ago
- ☆92Updated 5 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Updated 7 years ago
- ☆108Updated 6 years ago
- Executables that execute other stuff☆50Updated 6 years ago
- A "tiny" meterpreter stager☆127Updated 5 years ago
- ☆61Updated this week
- ☆43Updated this week
- medium-rare☆27Updated 4 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆75Updated 6 years ago
- few months old but better than nothing☆58Updated 2 years ago
- ☆48Updated this week
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆129Updated 10 years ago
- Platform independent peCloak fork based on Capstone☆103Updated 8 years ago
- PoC dlls for Task Scheduler COM Hijacking☆89Updated 8 years ago
- ☆76Updated this week
- Generates anti-sandbox analysis HTA files without payloads☆118Updated 7 years ago
- Powershell to CodeExecution and ProcessInjection☆63Updated 7 years ago
- ☆144Updated this week
- Shim database persistence (Fin7 TTP)☆35Updated 4 years ago
- ☆58Updated 7 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆60Updated 7 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆133Updated 4 years ago
- A sample bot for Cobalt Strike 3☆22Updated 8 years ago