nullsecuritynet / toolsLinks
Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
☆53Updated last year
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆55Updated 3 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆40Updated last year
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 2 years ago
- An offensive security framework for writing payloads☆17Updated 2 years ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆46Updated last month
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆21Updated last month
- AES-256 Microsoft Cryptography API Example Use.☆30Updated last year
- Antivirus Signature Search Toolkit☆80Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- A script to automate keystrokes through a graphical desktop program.☆35Updated 4 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆82Updated 3 months ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- a small wiper malware programmed in c#☆55Updated 2 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- ☆15Updated 3 years ago
- Advanced network security tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integr…☆12Updated 11 months ago
- Inject shellcode into a valid BMP/GIF image.☆30Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- A sophisticated PowerShell script that stealthily injects Base64-encoded shellcode into the target process, featuring anti-debugging tech…☆20Updated 11 months ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆32Updated 2 years ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆22Updated 7 months ago
- Python, C++ and Go☆22Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- hiding in plain sight: part 2☆45Updated 10 months ago
- ☆12Updated last year
- A collection of PoCs for different injection techniques on Windows!☆43Updated last year