nixpal / shellcloakLinks
A tool to teleport shellcode to victim's device without triggering IDS or AV 100% FUD
☆16Updated 3 years ago
Alternatives and similar repositories for shellcloak
Users that are interested in shellcloak are comparing it to the libraries listed below
Sorting:
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Updated 3 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 6 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- The Hunt for Malicious Strings☆13Updated 5 years ago
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53Updated 7 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- C++ implant that interfaces with a SK8PARK server☆49Updated 4 years ago
- AV/EDR evasion via direct system calls.☆32Updated 4 years ago
- Python 3 server used to control SK8RAT implant☆36Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆38Updated 2 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 5 years ago
- A PowerShell script anti-virus evasion tool☆18Updated 4 years ago
- C++ function that will automagically unhook a specified Windows API☆62Updated 5 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- Simple Process Hollowing in C#☆68Updated 8 years ago
- medium-rare☆28Updated 6 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 5 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆102Updated 2 years ago
- Proxy system calls over an RPC channel☆99Updated 3 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 3 months ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Applying some AV evasion techniques on a metasploit reverse shell