Materials from the speech "How to protect yourself from hidden web shells"
-
Updated
Jan 16, 2024 - PHP
Materials from the speech "How to protect yourself from hidden web shells"
LOLGEN: Living Off The Land Payload Generator
Powershell Malware
Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionality to specify a method to execute if the file is a DLL. The script utilizes the pythonmemorymodule library for memory manipulation.
A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls
Powerful script for logical obfuscation of powershell scripts
Slui File Handler Hijack UAC Bypass Local Privilege Escalation
Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement
A library for loading and executing PE (Portable Executable) from memory without ever touching the disk
🚫💾 Run binaries straight from memory in Linux
Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.
Add a description, image, and links to the fileless topic page so that developers can more easily learn about it.
To associate your repository with the fileless topic, visit your repo's landing page and select "manage topics."