netspooky / kimagureLinks
☆44Updated 4 years ago
Alternatives and similar repositories for kimagure
Users that are interested in kimagure are comparing it to the libraries listed below
Sorting:
- A tool to tunnel TCP traffic over WinRM☆18Updated 4 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Hookers are cooler than patches.☆170Updated 4 years ago
- WNF Code Execution Library Using C#☆112Updated 5 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆152Updated last year
- Managed code hooking template.☆108Updated 4 years ago
- ☆101Updated last year
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- Bypassing AppLocker with C#☆144Updated 4 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Updated 5 years ago
- ☆59Updated 4 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 3 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- ☆112Updated 2 years ago
- ☆50Updated 3 years ago
- code for the Proxy DLL example blog post☆62Updated 4 years ago
- ☆68Updated 3 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆145Updated 4 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆229Updated 4 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- ☆121Updated 2 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- Offensive tool to trigger network authentications as SYSTEM☆144Updated 4 years ago
- CyberSec Blog☆98Updated 2 weeks ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- ☆144Updated 2 years ago
- Dll that can be used for side loading and other attack vector.☆204Updated 5 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆133Updated 2 years ago