paranoidninja / Botnet-blogpost
This repo basically contains the code that was mentioned in the blogposts that was written by me at:
☆89Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Botnet-blogpost
- This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆191Updated 4 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆86Updated 4 years ago
- Penetration Test / Read Team - C# tools repository☆56Updated 2 years ago
- Shellcoding utilities☆219Updated 3 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆240Updated 4 years ago
- Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61☆37Updated 7 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆173Updated 3 months ago
- Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.☆199Updated 7 years ago
- ☆131Updated last year
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆34Updated 5 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆87Updated 5 years ago
- Malicious Shortcut(.lnk) Generator☆72Updated 5 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆213Updated 4 years ago
- Red Team Operator: Malware Development Essentials Course☆92Updated 4 years ago
- Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking☆136Updated 4 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆138Updated last year
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 6 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆341Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆137Updated 3 years ago
- Evasive Process Hollowing Techniques☆134Updated 4 years ago
- The program is designed to obfuscate the shellcode.☆193Updated 3 years ago
- DLL Generator for side loading attack☆167Updated 5 years ago
- Personal research and publication on malware families☆137Updated 2 years ago
- How to spoof the command line when spawning a new process from C#.☆103Updated 2 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆142Updated 3 years ago
- ☆237Updated 6 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆127Updated last year
- A fake AMSI Provider which can be used for persistence.☆139Updated 3 years ago