rokups / virtual-reality
Stealthy backdoor for Windows operating systems
☆272Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for virtual-reality
- Persisting in the Windows registry "invisibly"☆339Updated 6 years ago
- APT34/OILRIG leak☆231Updated 5 years ago
- A PowerShell example of the Windows zero day priv esc☆321Updated 6 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆312Updated 6 years ago
- A list of ways to execute code on Windows using legitimate Windows tools☆303Updated 5 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆211Updated 4 years ago
- a tool to make it easy and fast to test various forms of injection☆172Updated 5 years ago
- Search for code cave in all binaries☆276Updated 4 months ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆368Updated 9 months ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆328Updated last year
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆116Updated 5 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆173Updated 3 months ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆290Updated 7 years ago
- AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.☆384Updated 5 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆254Updated 5 years ago
- ssh-client worm☆154Updated 4 years ago
- PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.☆417Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Updated 6 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆255Updated 3 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆462Updated 3 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆143Updated last year
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆170Updated 4 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆328Updated this week
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆494Updated 5 years ago