v-p-b / peCloakCapstone
Platform independent peCloak fork based on Capstone
☆103Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for peCloakCapstone
- Teaching old shellcode new tricks☆203Updated 7 years ago
- some pocs for antivirus evasion☆129Updated last year
- VBS Reversed TCP Meterpreter Stager☆86Updated 7 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆211Updated 4 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆94Updated 7 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Updated 7 years ago
- JavaScript Reversed TCP Meterpreter Stager☆136Updated 7 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆125Updated 6 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆133Updated 7 years ago
- Yet another AV evasion tool☆119Updated 2 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆146Updated 6 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆143Updated 9 years ago
- A "tiny" meterpreter stager☆127Updated 5 years ago
- DefCon24☆120Updated 8 years ago
- Liniaal - A communication extension to Ruler☆96Updated 6 years ago
- PowerDNS: Powershell DNS Delivery☆211Updated 6 years ago
- ☆112Updated 7 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆75Updated 6 years ago
- Meterpreter_Payload_Detection.exe tool for detecting Meterpreter in memory like IPS-IDS and Forensics tool☆160Updated last year
- How To Execute Shellcode via HTA☆136Updated 6 years ago
- Generates anti-sandbox analysis HTA files without payloads☆118Updated 7 years ago
- ☆140Updated 7 years ago
- Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)☆102Updated 3 years ago
- Windows RID Hijacking persistence technique☆165Updated this week
- Bypassing User Account Control (UAC) using TpmInit.exe☆126Updated 8 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- ☆85Updated 9 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆89Updated 11 years ago