rokups / virtual-realityLinks
Stealthy backdoor for Windows operating systems
☆280Updated 5 years ago
Alternatives and similar repositories for virtual-reality
Users that are interested in virtual-reality are comparing it to the libraries listed below
Sorting:
- Persisting in the Windows registry "invisibly"☆341Updated 6 years ago
- A list of ways to execute code on Windows using legitimate Windows tools☆307Updated 6 years ago
- APT34/OILRIG leak☆232Updated 6 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆323Updated 3 years ago
- A PowerShell example of the Windows zero day priv esc☆327Updated 6 years ago
- Search for code cave in all binaries☆282Updated 11 months ago
- a tool to make it easy and fast to test various forms of injection☆173Updated 6 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆328Updated last year
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Updated 10 months ago
- Public work for CVE-2019-0708☆292Updated 5 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- Teaching old shellcode new tricks☆205Updated 7 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Updated 4 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆370Updated last year
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆339Updated 3 years ago
- https://twitter.com/itsreallynick/status/1120410950430089224☆398Updated 6 years ago
- PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆421Updated 5 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆133Updated 4 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆152Updated 2 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆175Updated 4 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆350Updated 7 months ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆524Updated 2 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117Updated 6 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆182Updated 6 years ago
- Passwords Recovery Tool☆224Updated 4 years ago
- An attempt at Process Doppelgänging☆181Updated 7 years ago
- This is a **WIP** tool that performs shellcode obfuscation in x86 instruction set.☆239Updated 9 years ago
- Research on Anti-malware and other related security solutions☆259Updated 4 years ago
- UAC Bypass with mmc via alpc☆156Updated 6 years ago
- A fully functional DanderSpritz lab in 2 commands☆428Updated 6 years ago