nixpal / shellcloak
A tool to teleport shellcode to victim's device without triggering IDS or AV 100% FUD
☆15Updated 2 years ago
Alternatives and similar repositories for shellcloak:
Users that are interested in shellcloak are comparing it to the libraries listed below
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- A PowerShell script anti-virus evasion tool☆17Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- ☆15Updated 3 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- Penetration Test / Read Team - C# tools repository☆56Updated 3 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆69Updated 4 years ago
- Rite Of Passage ROP Injector☆34Updated 5 years ago
- medium-rare☆28Updated 5 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆35Updated last year
- AMSI Bypass for powershell☆30Updated 2 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆37Updated 3 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- A novel technique to communicate between threads using the standard ETHREAD structure☆111Updated 3 years ago
- How to spoof the command line when spawning a new process from C#.☆105Updated 3 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Updated 4 years ago