unkvolism / MiseryLinks
Misery Loader to bypass modern EDR solutions
☆10Updated 6 months ago
Alternatives and similar repositories for Misery
Users that are interested in Misery are comparing it to the libraries listed below
Sorting:
- Lena's scripts/code/resources for malware analysis☆27Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- ☆59Updated 9 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated 3 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆50Updated 3 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 8 months ago
- ☆35Updated 7 months ago
- Situational Awareness script to identify how and where to run implants☆54Updated 7 months ago
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆48Updated 6 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- ☆76Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆83Updated 4 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆64Updated 3 weeks ago
- ☆140Updated last month
- A small red team course☆40Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 5 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆88Updated last month
- ☆42Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆103Updated last year
- Encodes a payload within a generated mock-CSS file☆58Updated last year
- A Moodle Scanner☆42Updated 8 months ago
- ☆24Updated 4 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆157Updated 4 months ago
- ☆57Updated 8 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆61Updated 10 months ago
- Lena's repo of Malware Monsters aka Malmons.☆37Updated last week