paranoidninja / Botnet-blogpost
This repo basically contains the code that was mentioned in the blogposts that was written by me at:
☆93Updated 2 years ago
Alternatives and similar repositories for Botnet-blogpost:
Users that are interested in Botnet-blogpost are comparing it to the libraries listed below
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆34Updated 6 years ago
- This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆192Updated 4 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 7 years ago
- Red Team Operator: Malware Development Essentials Course☆98Updated 4 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆175Updated 7 months ago
- Shellcoding utilities☆221Updated 4 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆90Updated 5 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆142Updated 3 years ago
- ☆133Updated 3 weeks ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆88Updated 5 years ago
- Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.☆203Updated 7 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆244Updated 4 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆92Updated 2 years ago
- Petaq - Purple Team Command & Control Server☆103Updated 2 years ago
- Demos of various (also non standard) persistence methods used by malware☆221Updated 2 years ago
- Dll that can be used for side loading and other attack vector.☆201Updated 4 years ago
- Shellcode injector using direct syscalls☆119Updated 4 years ago
- Evasive Process Hollowing Techniques☆137Updated 4 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆346Updated 4 years ago
- DLL Generator for side loading attack☆170Updated 6 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated 2 years ago
- Personal research and publication on malware families☆137Updated 3 months ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- ☆252Updated 6 years ago
- A simple implant showcasing modern C++☆106Updated 4 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆215Updated 5 years ago
- Example DLL to load from Windows NetShell☆179Updated 8 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆141Updated 3 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆75Updated 5 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆114Updated 4 years ago