paranoidninja / Botnet-blogpost
This repo basically contains the code that was mentioned in the blogposts that was written by me at:
☆95Updated 2 years ago
Alternatives and similar repositories for Botnet-blogpost:
Users that are interested in Botnet-blogpost are comparing it to the libraries listed below
- This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆193Updated 4 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆245Updated 4 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆88Updated 5 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆346Updated 4 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆176Updated 8 months ago
- Red Team Operator: Malware Development Essentials Course☆98Updated 4 years ago
- Shellcoding utilities☆222Updated 4 years ago
- Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.☆204Updated 7 years ago
- ☆134Updated last month
- Dll that can be used for side loading and other attack vector.☆202Updated 4 years ago
- Personal research and publication on malware families☆137Updated 3 months ago
- Evasive Process Hollowing Techniques☆139Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- The program is designed to obfuscate the shellcode.☆200Updated 3 years ago
- Research on Anti-malware and other related security solutions☆258Updated 4 years ago
- DLL Generator for side loading attack☆171Updated 6 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆216Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 3 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆92Updated 2 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- Shellcode injector using direct syscalls☆119Updated 4 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆257Updated last month
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆138Updated 2 years ago
- A kernel rootkit with remote command and control interface for windows☆108Updated 7 years ago
- Simple EDR implementation to demonstrate bypass☆172Updated 4 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 3 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆90Updated 5 years ago