wekillpeople / metasploit-loaderLinks
metasploit loader with antivirus bypass module
☆18Updated 9 years ago
Alternatives and similar repositories for metasploit-loader
Users that are interested in metasploit-loader are comparing it to the libraries listed below
Sorting:
- Capture Webcam Reflective Dll☆8Updated 9 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆13Updated 9 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- Common Malware Techniques☆14Updated 2 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆27Updated 9 years ago
- wow64 syscall filter☆13Updated 10 years ago
- Enumerate all processes and get specified file's handle,then close it.☆11Updated 7 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 10 years ago
- CVE-2014-0816☆25Updated 8 years ago
- Post-explotation Hacks☆14Updated 6 years ago
- Anti-AV compilation☆44Updated 11 years ago
- Windows inject☆16Updated 7 years ago
- ☆12Updated 8 years ago
- ☆12Updated 10 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- just a basic rootkit for learning how to playing sys_call_table☆14Updated 8 years ago
- NTP Scanner and 'monlist' checker☆13Updated 9 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆29Updated 6 years ago
- it's a simple LKM rootkit.☆12Updated 9 years ago
- Ring3 Rootkit Backdoor.☆42Updated 10 years ago
- 虚拟机逃逸exp工具 VMware Escape Exploit before VMware WorkStation 12.5.5☆9Updated 7 years ago
- ☆23Updated 9 years ago
- 使用SSDT HOOK 在windows上隐藏指定文件或者文件夹☆26Updated 4 years ago
- ☆22Updated 8 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 9 years ago
- Dark Cloud Virus☆7Updated 8 years ago
- ☆15Updated 7 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- Malwarebytes Antivirus CVE☆8Updated 7 years ago
- ☆21Updated 8 years ago