petikvx / MSIL-Malwares
Sources Codes of many MSIL malwares
☆22Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for MSIL-Malwares
- ☆15Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- Source Code of MSIL Ransom☆13Updated last year
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆18Updated last year
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆12Updated 7 months ago
- Process injection via KernelCallbackTable☆14Updated 2 years ago
- Collection of IDA helpers☆15Updated 2 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆18Updated last year
- Collection of shellcode injection and execution techniques☆16Updated 3 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆20Updated last month
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year
- A simple PE loader.☆25Updated last year
- Utilizing Alternative Shellcode Execution Via Callbacks☆13Updated 11 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆23Updated 4 months ago
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆11Updated last week
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 2 years ago
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆21Updated 11 months ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆14Updated last year
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆19Updated 2 years ago
- ☆14Updated last year
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆9Updated 2 years ago
- using the Recycle Bin to insure persistence☆11Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆22Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 2 years ago
- How to bypass antivirus 2020☆7Updated 4 years ago