Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
-
Updated
Nov 1, 2024 - C
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
🚫💾 Run binaries straight from memory in Linux
A library for loading and executing PE (Portable Executable) from memory without ever touching the disk
Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement
Slui File Handler Hijack UAC Bypass Local Privilege Escalation
Powerful script for logical obfuscation of powershell scripts
A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls
Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionality to specify a method to execute if the file is a DLL. The script utilizes the pythonmemorymodule library for memory manipulation.
Powershell Malware
LOLGEN: Living Off The Land Payload Generator
Materials from the speech "How to protect yourself from hidden web shells"
Add a description, image, and links to the fileless topic page so that developers can more easily learn about it.
To associate your repository with the fileless topic, visit your repo's landing page and select "manage topics."