zerosum0x0-archive / archiveLinks
☆55Updated 3 years ago
Alternatives and similar repositories for archive
Users that are interested in archive are comparing it to the libraries listed below
Sorting:
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- Windows internals and exploitation tricks☆105Updated 3 months ago
- From directory deletion to SYSTEM shell☆111Updated 5 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 2 years ago
- code for the Proxy DLL example blog post☆61Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆66Updated 3 years ago
- Compile shellcode into an exe file from Windows or Linux.☆69Updated 3 months ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Updated 2 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆53Updated 4 years ago
- Random CVEs☆33Updated 4 months ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 3 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 4 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- Resources and articles I need to take a look at. Mostly about malware/exploit development and analysis.☆83Updated 3 years ago
- Simple skeleton for a CPP DLL☆39Updated 5 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆71Updated 3 years ago
- It's pointy and it hurts!☆126Updated 2 years ago
- CVE-2018-6066 using VBA☆67Updated 2 years ago
- Dumping credentials through windbg and pykd☆41Updated last year
- using the gpu to hide your payload☆59Updated 3 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆90Updated 5 years ago
- Bypass Malware Time Delays☆103Updated 2 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆103Updated 3 years ago
- Experiment on reproducing Obfuscate & Sleep☆148Updated 4 years ago
- NT AUTHORITY\SYSTEM☆39Updated 5 years ago
- Malicious Shortcut(.lnk) Generator☆85Updated 6 years ago