Category: Exploitation

GoPurple

GoPurple: shell code injection techniques

GoPurple This project is a simple collection of various shellcode injection techniques, aiming to streamline the process of endpoint detection evaluation, besides challenging myself to get into the Golang world. Install Requires go installed on a...

creating shellcodes

masm_shc: creating shellcodes

masm_shc A helper utility for creating shellcodes. Cleans MASM file generated by MSVC gives refactoring hints. demos Examples of the code to be refactored to shellcode: popup.cpp – a simple “Hello World” Message Box...

bypassing AV solutions

PEzor: powerful tool for bypassing AV solutions

PEzor an Open-Source PE Packer The phases of the development that will be described in detail are: set up the development environment with Mingw-w64 and LLVM shellcode injection with syscall inlining via NTDLL in-memory scraping (x86-64 only)...

Petaq

Petaq: Purple Team Command & Control Server

PetaQ PetaQ is a malware which is being developed in .NET Core/Framework to use websockets as Command & Control (C2) channels. It’s designed to provide a Proof of Concept (PoC) websocket malware to the...