whiterabb17 / gryphonLinks
Triple OS Malware development framework [ MacOS, Linux & Windows ]
☆14Updated 6 months ago
Alternatives and similar repositories for gryphon
Users that are interested in gryphon are comparing it to the libraries listed below
Sorting:
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆29Updated 2 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆30Updated 2 years ago
- ☆17Updated 5 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- Koadic C3 COM Command & Control - JScript RAT☆44Updated 7 years ago
- Red Team Operation's Defense Evasion Technique.☆52Updated last year
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆60Updated 2 years ago
- An offensive security framework for writing payloads☆17Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆34Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆33Updated 2 months ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆41Updated 5 months ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- LSTAR - CobaltStrike Translated to EN☆15Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆28Updated 2 years ago
- Lime Crypter Obfuscator Mod☆30Updated 11 months ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 2 years ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- Ransomware written in go, encrypt - decrypt.☆22Updated last month
- Havoc python api☆41Updated 2 years ago
- a small wiper malware programmed in c#☆54Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆41Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year