sergiLopez / Flanders-Trojan
Trojan written in C++ for Windows
β17Updated last year
Alternatives and similar repositories for Flanders-Trojan:
Users that are interested in Flanders-Trojan are comparing it to the libraries listed below
- How to bypass AMSI (Antimalware Scan Interface) in PowerShell/C++ by dynamically patching the AmsiScanBuffer function.β13Updated 2 weeks ago
- Payload Dropper with Persistance & Privesc & UAC bypass π±βπ€β13Updated last year
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends eβ¦β27Updated last year
- web based c2 π΄ββ οΈβ13Updated 8 months ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Pβ¦β15Updated 3 years ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.β11Updated 2 weeks ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permissionβ¦β16Updated 6 months ago
- Find kernel32 base and API addresses. Simple C++ implementationβ24Updated 3 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of courseβ29Updated 2 years ago
- Powerfull scripts to bypass windows defenderβ9Updated 3 years ago
- β28Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It providesβ¦β13Updated 11 months ago
- β17Updated 2 months ago
- β18Updated 5 months ago
- JALSI - Just Another Lame Shellcode Injectorβ30Updated 3 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe componentβ11Updated last year
- Ransomware written in go, encrypt - decrypt.β20Updated last week
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL packageβ33Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) courseβ20Updated 6 years ago
- π§ C# UAC Bypass technique using mock directories π§β28Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.β26Updated last month
- AV engines evasion for C++ simple malware part 1 source codeβ13Updated 2 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.β19Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.β18Updated last year
- Abusing autoElevate - Fully Undetectable UAC Bypass exploitβ11Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation exampleβ13Updated 3 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file shareβ16Updated 2 years ago
- β9Updated last month
- Just another Process Injection using Process Hollowing technique.β17Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current prβ¦β21Updated last year