trevorsaudi / Zero-Import-Malware
Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetModuleHandle windows APIs.
☆38Updated last year
Alternatives and similar repositories for Zero-Import-Malware:
Users that are interested in Zero-Import-Malware are comparing it to the libraries listed below
- Create Anti-Copy DRM Malware☆54Updated 7 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆82Updated 5 months ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆58Updated last year
- .bin file to shellcode convertor☆33Updated 8 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Winsocket for Cobalt Strike.☆97Updated last year
- Simple Shellcode Loader tool☆25Updated last year
- ☆53Updated 4 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆80Updated last year
- Classic Process Injection with Memory Evasion Techniques implemantation☆68Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆62Updated 2 months ago
- PowerShell script to generate ShellCode in various formats☆42Updated 5 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆52Updated last month
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆67Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- ☆120Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 6 months ago
- Red Team Operation's Defense Evasion Technique.☆52Updated 9 months ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆42Updated last week
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆81Updated 2 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆149Updated last year
- Improved version of EKKO by @5pider that Encrypts only Image Sections☆118Updated 2 years ago
- lsassdump via RtlCreateProcessReflection and NanoDump☆80Updated 5 months ago
- Rex Shellcode Loader for AV/EDR evasion☆30Updated 11 months ago
- ☆54Updated 4 months ago
- Code snippets to add on top of cobalt strike sleep mask to achieve patchless hook on AMSI and ETW☆83Updated 2 years ago
- Construct the payload at runtime using an array of offsets☆62Updated 9 months ago