whydee86 / FUD-ShellCode-UUID
Making Shellcode fully undetectable using uuid
☆23Updated 3 years ago
Alternatives and similar repositories for FUD-ShellCode-UUID:
Users that are interested in FUD-ShellCode-UUID are comparing it to the libraries listed below
- Using syscall to load shellcode, Evasion techniques☆27Updated 3 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆35Updated 3 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆16Updated 2 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Another AMSI bypass - but in C++.☆23Updated last year
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆19Updated last year
- AMSI Bypass for powershell☆30Updated 2 years ago
- Unhook DLL via cleaning the DLL 's .text section☆9Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆14Updated 3 years ago
- Bypass Windows defender syscall☆18Updated 3 years ago
- Beacon Object File implementation of Yaxser's Backstab☆15Updated 3 years ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Extracting Syscall Stub, Modernized☆63Updated 3 years ago
- Akame is an open-source, shellcode loader written in C++17☆19Updated 3 weeks ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆69Updated last year
- A PowerShell script anti-virus evasion tool☆17Updated 4 years ago
- Inject shellcode into process via "EarlyBird"☆26Updated 3 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39Updated 3 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆34Updated 3 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 10 months ago
- Load PE via XML Attribute☆30Updated 5 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆93Updated 3 years ago
- Injects shellcode into remote processes using direct syscalls☆77Updated 4 years ago
- NanoCore rat stub source code☆36Updated 2 years ago
- Small POC for process ghosting☆39Updated 3 years ago
- Extended Process List (Search functionality)☆29Updated 4 years ago
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago