trevorsaudi / Zero-Import-MalwareLinks
Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetModuleHandle windows APIs.
☆39Updated last year
Alternatives and similar repositories for Zero-Import-Malware
Users that are interested in Zero-Import-Malware are comparing it to the libraries listed below
Sorting:
- Simple Shellcode Loader tool☆26Updated 2 years ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆60Updated 2 years ago
- Create Anti-Copy DRM Malware☆59Updated 10 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- Rex Shellcode Loader for AV/EDR evasion☆33Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆63Updated 6 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 9 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- Early cascade injection PoC based on Outflanks blog post written in Rust☆54Updated 5 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆95Updated 9 months ago
- Winsocket for Cobalt Strike.☆99Updated 2 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆38Updated last year
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆41Updated 2 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆114Updated last year
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆73Updated last week
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆47Updated 6 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- A repository holding Proof of Concepts for executing the calculator application via different file formats☆38Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆33Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated 2 years ago
- ☆55Updated 8 months ago
- Proof-of-concept exploit for CVE-2024-25153.☆42Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆82Updated 8 months ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆88Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆34Updated last year
- RegStrike is a .reg payload generator☆58Updated last year
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆80Updated last month
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆105Updated 2 years ago