vaishnavucv / Project-winEvasion-RedteamLinks
Project build for joel and joshua students from Germany | course: Advanced Tactics in information security
☆24Updated 8 months ago
Alternatives and similar repositories for Project-winEvasion-Redteam
Users that are interested in Project-winEvasion-Redteam are comparing it to the libraries listed below
Sorting:
- Malware Libraries focused in help Malware Development☆27Updated 2 years ago
- MalDev & AV-EDR Evasion for Pentesters☆17Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆41Updated 5 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 6 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- Just another Process Injection using Process Hollowing technique.☆19Updated 2 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 3 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆57Updated last year
- ☆20Updated 5 months ago
- A pure C version of SymProcAddress☆30Updated last year
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- ☆29Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆24Updated 5 months ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 5 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- reverse engineering random malwares☆22Updated 8 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆19Updated 2 years ago
- ☆16Updated 5 months ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆21Updated last year
- a small wiper malware programmed in c#☆58Updated 2 years ago
- Tool to retrieve Config from Redline C2 servers☆16Updated 2 years ago
- ☆30Updated last month
- AES-256 Microsoft Cryptography API Example Use.☆33Updated last year
- EvtPsst☆55Updated last year
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆11Updated 5 months ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆73Updated last year
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year