nixpal / shellcloakLinks
A tool to teleport shellcode to victim's device without triggering IDS or AV 100% FUD
☆15Updated 3 years ago
Alternatives and similar repositories for shellcloak
Users that are interested in shellcloak are comparing it to the libraries listed below
Sorting:
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- The Hunt for Malicious Strings☆13Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Updated 3 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- A PowerShell script anti-virus evasion tool☆18Updated 4 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- C++ function that will automagically unhook a specified Windows API☆62Updated 5 years ago
- Simple Process Hollowing in C#☆68Updated 7 years ago
- Collection of Offensive C# Tooling☆12Updated 3 years ago
- ☆37Updated 3 years ago
- ☆55Updated 3 years ago
- medium-rare☆28Updated 5 years ago
- C++ implant that interfaces with a SK8PARK server☆49Updated 4 years ago
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53Updated 7 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Updated 4 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆102Updated 2 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 6 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 5 years ago
- A .NET binary loader that bypasses AMSI☆45Updated 4 years ago