sergiLopez / Flanders-TrojanLinks
Trojan written in C++ for Windows
β18Updated last year
Alternatives and similar repositories for Flanders-Trojan
Users that are interested in Flanders-Trojan are comparing it to the libraries listed below
Sorting:
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.β20Updated 2 years ago
- web based c2 π΄ββ οΈβ13Updated 11 months ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10β37Updated 2 years ago
- π§ C# UAC Bypass technique using mock directories π§β28Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macroβ¦β24Updated 3 years ago
- β29Updated last year
- JALSI - Just Another Lame Shellcode Injectorβ30Updated 3 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass π±βπ€β13Updated last year
- AMSI Bypass for powershellβ30Updated 3 years ago
- Find kernel32 base and API addresses. Simple C++ implementationβ24Updated 3 years ago
- Shellcode loader with evasion capabilities written in Nimβ13Updated 5 months ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Pβ¦β15Updated 3 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file shareβ16Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.β22Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.β19Updated 3 years ago
- Execute Remote Assembly with args passing and with AMSI and ETW patchingβ11Updated 2 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends eβ¦β27Updated last year
- β18Updated 7 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.β12Updated 2 months ago
- β14Updated last year
- Recon-ng modules for basic OSINT.β11Updated 3 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current prβ¦β21Updated last year
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executabβ¦β45Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.β16Updated 5 years ago
- β25Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.β35Updated 2 months ago
- Yet, Another Packer/Loaderβ25Updated 2 years ago
- An offensive security framework for writing payloadsβ17Updated 2 years ago
- Ransomware written in go, encrypt - decrypt.β25Updated 2 months ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagementβ65Updated 3 years ago