Pinned Repositories
Admin2Sys
Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM
DumpLsass
C++ Code to perform a MiniDump of lsass.exe
GhostShell
Interactive shell to execute commands anonymously using Proxychains and Tor
HTTP_POST-Login-BruteForce
HTTP_POST Login BruteForce
NinjaInjector
Classic Process Injection with Memory Evasion Techniques implemantation
RDPCredentialStealer
RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++
RedNeuron
RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾
S12URootkit
User Mode Windows Rootkit
ShadowByte-Botnet
Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS
WinDefenderKiller
Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys
S12cybersecurity's Repositories
S12cybersecurity/WinDefenderKiller
Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys
S12cybersecurity/RDPCredentialStealer
RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++
S12cybersecurity/NinjaInjector
Classic Process Injection with Memory Evasion Techniques implemantation
S12cybersecurity/S12URootkit
User Mode Windows Rootkit
S12cybersecurity/Admin2Sys
Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM
S12cybersecurity/ShadowByte-Botnet
Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS
S12cybersecurity/DumpLsass
C++ Code to perform a MiniDump of lsass.exe
S12cybersecurity/PrivilegeEscalationClass
C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin
S12cybersecurity/ExplorerUACStealer
ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++
S12cybersecurity/PDFTypeSpoofing
PDF Icon File Type Spoofer
S12cybersecurity/AdminX
AdminX it's a Malware to execute process as some users from a Windows OS
S12cybersecurity/AntiVM
C++ Class with various techniques to detect the execution in a virtualized environment
S12cybersecurity/FreeThreadHijacking
Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory
S12cybersecurity/ThreatHijacking
Threat Hijacking Simple Implementation
S12cybersecurity/VirtualAlloc-Implementation
My Own VirtualAlloc Implementation to use as alternative unknown for all the defense solutions of VirtualAlloc Win32 API Function
S12cybersecurity/AntiDebugging
Anti Debugging C++ Class
S12cybersecurity/KernelProcessesTerminator
Terminate Processes from a Kernel Driver receiving the process to kill via simple userland application
S12cybersecurity/Reflective-DLL
Reflective DLL Injection Implementation
S12cybersecurity/FreeLoaderInjector
Typical Process Injection using Opened Handle Process, RWX Memory Space
S12cybersecurity/IATHooking
Import Address Table Hooking Implementation
S12cybersecurity/IPCObjects
C++ Code to perform IPC (Inter Process Connection) to share C++ Objects/Structures with other processes
S12cybersecurity/KernelEventMonitor
Monitoring Process Creation/Termination, Thread Creation/Termination and Image Load Notifications from a Kernel Driver
S12cybersecurity/MapFreeMemoryHandles
Find all type of handles free in Windows Memory
S12cybersecurity/RemoteFunctionPatcher
Patch (block) whatever function you want in a remote process. Adding a ret instruction at the first memory address of this function, the target function will be exited automatically all the times called by this process
S12cybersecurity/ResurrectedMalware
Malware Implant to Simulate various Resurretion Techniques
S12cybersecurity/SysmonDetox
C++ Class with offensive Red Team techniques to target Sysmon
S12cybersecurity/HideProcessesDKOM
Taking advantatge of Direct Kernel Object Manipulation to hide process from the EPROCESS structure
S12cybersecurity/RWXFinder
Find Windows RWX Memory Regions depending on the memory space needed
S12cybersecurity/SecurityDetox
Detect and Delete Security Products
S12cybersecurity/SimpleDriver
Simple C++ Windows Kernel Driver