nixpal / shellcloak
A tool to teleport shellcode to victim's device without triggering IDS or AV 100% FUD
☆15Updated 2 years ago
Related projects: ⓘ
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 2 years ago
- The Hunt for Malicious Strings☆12Updated 3 years ago
- ☆15Updated 2 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 3 years ago
- ☆42Updated this week
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆12Updated 2 years ago
- A proof of concept I developed to improve Gargoyle back in 2018 to achieve true memory obfuscation from position independent code☆33Updated last week
- Generate droppers with encrypted payloads automatically.☆53Updated 2 years ago
- AMSI Bypass for powershell☆29Updated 2 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆33Updated 10 months ago
- Penetration Test / Read Team - C# tools repository☆56Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated last year
- How to spoof the command line when spawning a new process from C#.☆100Updated 2 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 5 years ago
- C++ implant that interfaces with a SK8PARK server☆47Updated 3 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆65Updated 3 years ago
- ☆53Updated 2 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated last year
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆68Updated 3 years ago
- medium-rare☆27Updated 4 years ago
- A PowerShell script anti-virus evasion tool☆17Updated 3 years ago
- AV/EDR evasion via direct system calls.☆32Updated 3 years ago
- ☆11Updated this week
- Antiscan.me automatization script☆27Updated 4 months ago
- ☆13Updated 2 years ago
- ☆19Updated this week
- Collection of Offensive C# Tooling☆11Updated 2 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Updated 3 years ago