rkzofficial / HorizonLinks
Remote Administration Tool, Server Written in C# and Client Written in C++
☆14Updated 3 years ago
Alternatives and similar repositories for Horizon
Users that are interested in Horizon are comparing it to the libraries listed below
Sorting:
- C# source code obfuscator☆18Updated 6 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Updated 3 years ago
- The evolution of NxRansomware☆11Updated 6 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Updated 6 years ago
- Loader and RunPE file executer☆18Updated 6 years ago
- Runpe + DInvoke + Syscall☆16Updated 4 years ago
- simple WMI Viewer☆21Updated 5 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Updated 6 years ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Updated 7 years ago
- Learning Process Injection and Hollowing techniques☆42Updated 3 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Updated 6 years ago
- C# Codedom example / builder☆24Updated 5 years ago
- ☆19Updated 5 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 4 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆53Updated 7 years ago
- Anti-.NET Malware/Packers - Detect most .NET Packers (and some native) used for malware.☆25Updated 8 years ago
- C++ Host .NET CLR & Run a assembly directly from ressource (RT_RCDATA) without extraction disk.☆15Updated 2 years ago
- Downloads, decode, decrypt and executes a VBScript using cmd and mshta☆19Updated 5 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- .net based packer/obfuscator with apc based pe injection☆15Updated 9 years ago
- Remote PE reflective injection with a simple reflective loader☆32Updated 6 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Updated 4 years ago
- Software Protector☆19Updated 5 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆39Updated 5 years ago
- Loading a native DLL in the memory.☆70Updated 7 years ago
- Injecting shellcode into a process memory and executing it in C#☆52Updated 3 years ago
- TCP Asynchronous Socket - Remote Administration Tool☆10Updated 7 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 7 years ago