nixpal / shellcloak
A tool to teleport shellcode to victim's device without triggering IDS or AV 100% FUD
☆15Updated 2 years ago
Alternatives and similar repositories for shellcloak:
Users that are interested in shellcloak are comparing it to the libraries listed below
- Recreating and reviewing the Windows persistence methods☆37Updated 3 years ago
- ☆16Updated 3 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- My doodles as I learn C#☆75Updated 4 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆14Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆70Updated 4 years ago
- ☆55Updated 3 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- C++ implant that interfaces with a SK8PARK server☆48Updated 3 years ago
- A PowerShell script anti-virus evasion tool☆17Updated 4 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Injects shellcode into remote processes using direct syscalls☆74Updated 4 years ago
- ☆37Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆38Updated 3 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 3 years ago
- medium-rare☆28Updated 5 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 6 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆52Updated 6 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- C# Based Universal API Unhooker - Automatically Unhook API Hives (ntdll.dll,kernel32.dll,user32.dll,and kernelbase.dll)☆22Updated last year
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago