v-p-b / peCloakCapstoneLinks
Platform independent peCloak fork based on Capstone
☆106Updated 9 years ago
Alternatives and similar repositories for peCloakCapstone
Users that are interested in peCloakCapstone are comparing it to the libraries listed below
Sorting:
- A "tiny" meterpreter stager☆128Updated 5 years ago
- some pocs for antivirus evasion☆131Updated last year
- Teaching old shellcode new tricks☆205Updated 7 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- JavaScript Reversed TCP Meterpreter Stager☆137Updated 8 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Updated 4 years ago
- VBS Reversed TCP Meterpreter Stager☆88Updated 8 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Updated 8 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆137Updated 7 years ago
- ☆105Updated 4 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆76Updated 6 years ago
- VBA Reversed TCP Meterpreter Stager☆62Updated 7 years ago
- How To Execute Shellcode via HTA☆139Updated 7 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- ☆94Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- A payload stager using PowerShell☆184Updated 5 years ago
- Binary resource copier☆98Updated 2 months ago
- Yet another AV evasion tool☆119Updated 3 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆115Updated 8 years ago
- Meterpreter_Payload_Detection.exe tool for detecting Meterpreter in memory like IPS-IDS and Forensics tool☆162Updated 2 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆210Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆128Updated 8 years ago
- ☆86Updated 9 years ago
- Generates anti-sandbox analysis HTA files without payloads☆119Updated 8 years ago
- Listening Post for Throwback Implant☆110Updated 9 years ago
- A command line tool for creating malicious outlook rules☆164Updated 6 years ago
- ☆114Updated 8 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago