trevorsaudi / Zero-Import-MalwareView external linksLinks
Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetModuleHandle windows APIs.
☆40Oct 26, 2023Updated 2 years ago
Alternatives and similar repositories for Zero-Import-Malware
Users that are interested in Zero-Import-Malware are comparing it to the libraries listed below
Sorting:
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆115Sep 29, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆35Oct 2, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- ☆106Sep 12, 2024Updated last year
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- Mass Reverse IP Lookup is a multithreaded tool to reverse ip lookup a list of ip addresses using yougetsignal.com .☆21May 23, 2020Updated 5 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Oct 28, 2023Updated 2 years ago
- ☆89Jan 2, 2024Updated 2 years ago
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Mar 13, 2024Updated last year
- ☆162Oct 25, 2023Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Jul 14, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆13Jun 2, 2024Updated last year
- A python RCE exploit on QNAP-QTS☆14Sep 15, 2020Updated 5 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- ☆13Nov 30, 2023Updated 2 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆13Jul 16, 2025Updated 6 months ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆29Dec 19, 2023Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Oct 10, 2022Updated 3 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Feb 22, 2024Updated last year
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆59Dec 15, 2023Updated 2 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Create a malicious pip package (PoC)☆12Sep 14, 2023Updated 2 years ago
- ☆16Nov 26, 2024Updated last year
- Patching framework for Xtensa based Qualcomm Wifi chips☆13Aug 7, 2023Updated 2 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Lifetime AMSI bypass by @ZeroMemoryEx ported to .NET Framework 4.8☆351Aug 29, 2024Updated last year
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆147May 6, 2023Updated 2 years ago
- CVE-2023-20198 & 0Day Implant Scanner☆33Dec 7, 2025Updated 2 months ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- ☆244Sep 19, 2023Updated 2 years ago
- ☆151Oct 2, 2023Updated 2 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Cumulus is web application weakness monitoring, works with just 3 code lines☆40Jan 27, 2023Updated 3 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆44Feb 3, 2026Updated last week