nigamaviral / Malicious-Browser-ExtensionLinks
System Security Project
☆13Updated 8 years ago
Alternatives and similar repositories for Malicious-Browser-Extension
Users that are interested in Malicious-Browser-Extension are comparing it to the libraries listed below
Sorting:
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆54Updated 6 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- ☆45Updated 7 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- ☆43Updated 6 years ago
- Steal users password with a fake sudo function.☆42Updated last year
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- Windows 10 Exploit☆30Updated 6 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 5 years ago
- ☆52Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆77Updated 5 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 5 years ago
- Experiments on the Windows Internals☆30Updated 6 years ago
- PoC for CVE-2020-1015☆39Updated 5 years ago
- A set of commands to bypass Defender (and some other AVs)☆20Updated 6 years ago
- AMSI detection PoC☆31Updated 5 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Updated 9 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 5 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22Updated 6 years ago
- ☆45Updated 6 years ago
- Automate AV evasion by calling AMSI☆86Updated 2 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆74Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 8 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- ☆11Updated 6 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 6 years ago
- ☆16Updated 10 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- Initial Commit of Coresploit☆57Updated 3 years ago
- ☆19Updated 4 years ago