paranoidninja / Botnet-blogpostLinks
This repo basically contains the code that was mentioned in the blogposts that was written by me at:
☆97Updated 2 years ago
Alternatives and similar repositories for Botnet-blogpost
Users that are interested in Botnet-blogpost are comparing it to the libraries listed below
Sorting:
- This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆199Updated 5 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆179Updated last year
- ☆136Updated 6 months ago
- Visual Basic Code universal Obfuscator intended to be used during penetration testing assignments.☆136Updated 3 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆94Updated 3 months ago
- Shellcoding utilities☆223Updated 4 years ago
- DLL Generator for side loading attack☆175Updated 6 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆249Updated 5 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- a tool to make it easy and fast to test various forms of injection☆173Updated 6 years ago
- Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.☆204Updated 8 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆143Updated 4 years ago
- The program is designed to obfuscate the shellcode.☆202Updated 4 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- Dll that can be used for side loading and other attack vector.☆202Updated 5 years ago
- Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61☆40Updated 8 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆217Updated 5 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆217Updated 2 years ago
- Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking☆142Updated 5 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 5 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆90Updated 5 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Updated 5 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- Windows RID Hijacking persistence technique☆176Updated 10 months ago
- Winsock accept() Backdoor Implant.☆116Updated 4 years ago
- Simple Process Hollowing in C#☆69Updated 7 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆130Updated 4 years ago
- 2018 School project - PoC of malware code obfuscation in Word macros☆153Updated 4 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago