wsummerhill / Malware_Weaponization
A curated list of tools and techniques written from experience in weaponization of malware
☆34Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Malware_Weaponization
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆38Updated 3 years ago
- ☆16Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 4 months ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 2 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 2 years ago
- Simple AV Evasion for PE Files☆41Updated 2 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆12Updated 4 years ago
- ☆47Updated 4 years ago
- ☆30Updated 4 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆17Updated 6 months ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆49Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Modified version of PEAS client for offensive operations☆38Updated last year
- PoC-Malware-TTPs☆48Updated last year
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆37Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- ☆24Updated 3 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆42Updated 3 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated this week
- (kinda) Malicious Outlook Reader☆17Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆47Updated 2 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆59Updated 5 years ago
- ☆24Updated 3 years ago