nixpal / shellcloakLinks
A tool to teleport shellcode to victim's device without triggering IDS or AV 100% FUD
☆16Updated 3 years ago
Alternatives and similar repositories for shellcloak
Users that are interested in shellcloak are comparing it to the libraries listed below
Sorting:
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆72Updated 7 years ago
- Simple Process Hollowing in C#☆68Updated 8 years ago
- AV/EDR evasion via direct system calls.☆32Updated 5 years ago
- The Hunt for Malicious Strings☆13Updated 5 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Updated 6 years ago
- C++ function that will automagically unhook a specified Windows API☆62Updated 5 years ago
- Penetration Test / Read Team - C# tools repository☆55Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- medium-rare☆28Updated 6 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- C++ implant that interfaces with a SK8PARK server☆49Updated 4 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- Python 3 server used to control SK8RAT implant☆36Updated 5 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 5 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 5 years ago
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53Updated 7 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 5 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Updated 5 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆92Updated 4 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Updated 4 years ago
- Collection of Offensive C# Tooling☆13Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆15Updated 5 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆17Updated 6 years ago