Reverse shell macro using Word VBA
☆17Oct 10, 2020Updated 5 years ago
Alternatives and similar repositories for MaliciousVBA
Users that are interested in MaliciousVBA are comparing it to the libraries listed below
Sorting:
- ☆13Oct 20, 2021Updated 4 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- A batch script for taking information. A bit overdeveloped, and kind of useless.☆39Apr 1, 2023Updated 2 years ago
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Go command line app to exploit file upload vulnerability☆12Feb 8, 2017Updated 9 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- Runpe + DInvoke + Syscall☆16Jun 18, 2021Updated 4 years ago
- 简单版的PE加载器☆12Aug 11, 2020Updated 5 years ago
- All Our Products☆12Jan 7, 2021Updated 5 years ago
- An advanced keylogger with a GUI redirects traffic via TOR, designed to be executed on unix operating systems☆13Mar 2, 2021Updated 5 years ago
- inject and run code into arbitrary process (x86 and x64)☆14Oct 20, 2021Updated 4 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- A python based semi-automatic buffer overflow exploit script☆16Sep 6, 2020Updated 5 years ago
- Simple little rootkit made in C☆13Feb 15, 2021Updated 5 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Sep 6, 2019Updated 6 years ago
- An SQL injection playground, basic to advanced☆17Jun 19, 2023Updated 2 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆15Apr 26, 2021Updated 4 years ago
- UAdmin Phishlets for common sites☆16Jun 12, 2025Updated 8 months ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- This PS script will extract macro from Excel and Word files. Also checks the macro for suspecious code patterns Includes temporary DDE ch…☆34Jul 7, 2024Updated last year
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- muddyc3_golang☆21Feb 13, 2020Updated 6 years ago
- Non organized Cpp code files I used for my research on Windows☆28Aug 9, 2020Updated 5 years ago
- Defense Evasion & Bypass AntiVirus reference☆74Mar 28, 2021Updated 4 years ago
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆75Aug 17, 2020Updated 5 years ago
- Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444☆16Sep 29, 2021Updated 4 years ago
- Change hash for a signed pe☆17Jul 18, 2023Updated 2 years ago
- Caeser Cipher your shellcode!☆21Mar 11, 2022Updated 3 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17May 18, 2021Updated 4 years ago
- A sleek remote administration tool☆12Jan 30, 2021Updated 5 years ago
- Fully functioning reverse shell written entirely in VBA.☆126Jun 5, 2023Updated 2 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago