petikvx / OfficeMalwares
Sources Codes of many Office Malwares
☆16Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for OfficeMalwares
- Dump Lsass Memory Using a Reflective Dll☆14Updated 2 years ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- ☆12Updated 2 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- ☆14Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- Compiled Binaries for Sharp Suite☆13Updated 4 years ago
- Apfell implant written in C#.☆8Updated 3 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆16Updated last year
- My nim learning experiments☆11Updated 2 years ago
- ☆45Updated 3 years ago
- AMSI detection PoC☆30Updated 4 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆14Updated last year
- ADD/SUB encoder for alphanumeric shellcode☆9Updated 5 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- ☆16Updated last year
- Tricard - Malware Sandbox Fingerprinting☆19Updated 11 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆16Updated 7 years ago
- Loading and executing shellcode in C# without PInvoke.☆21Updated 2 years ago
- ☆23Updated 4 years ago