yatt-ze / Medusa
rshell manager for the game Grey Hack
☆11Updated last year
Alternatives and similar repositories for Medusa
Users that are interested in Medusa are comparing it to the libraries listed below
Sorting:
- PhishX - The Complete Spear Phishing Tool☆14Updated 6 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆18Updated 3 months ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- Multiple Password Generator - Unique Characters, Unique Sequences, Numbers, Uppercase, Lowercase, Symbols, Multiple Generator☆13Updated 7 years ago
- TaskMgr Volatile Environment LPE☆13Updated 5 months ago
- ☆7Updated 5 years ago
- My Own VirtualAlloc Implementation to use as alternative unknown for all the defense solutions of VirtualAlloc Win32 API Function☆8Updated last year
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- Component Services Volatile Environment LPE☆11Updated 5 months ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- An Assembly x86 code that shows Windows MessageBox kept as simple as possible.☆11Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- Tutorials for getting started with Pwntools☆12Updated 2 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Display Languages Volatile Environment LPE☆10Updated 5 months ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated 2 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 5 months ago
- ☆10Updated 6 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 6 years ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆11Updated 4 months ago
- Seven different DLL injection techniques in one single project.☆11Updated 4 years ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- Blocking smartscreen, security center, forensic processes and 3rd party security applications on Windows Operating Systems☆15Updated 2 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆21Updated 3 weeks ago