S12cybersecurity's repositories
WinDefenderKiller
Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys
RDPCredentialStealer
RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++
NinjaInjector
Classic Process Injection with Memory Evasion Techniques implemantation
S12URootkit
User Mode Windows Rootkit
ShadowByte-Botnet
Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS
RansomwareS12
Simple Ransoware to attack Windows 🌟
ExplorerUACStealer
ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++
PrivilegeEscalationClass
C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin
WindowInjector
Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection
MalDev-Lib
Malware Libraries focused in help Malware Development
FileExtractor
C++ Code to Extract Windows File and Receive in Linux Machine
KeyloggerS12
C++ keylogger to save all the keys pressed into a local txt file
MySQL-DataStealer
Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened with a Server to receive the extracted Files
ThreatHijacking
Threat Hijacking Simple Implementation
VirtualAlloc-Implementation
My Own VirtualAlloc Implementation to use as alternative unknown for all the defense solutions of VirtualAlloc Win32 API Function
Reflective-DLL
Reflective DLL Injection Implementation
AntiDebugging
Anti Debugging C++ Class
BruteMySQL
Bruteforce MySQL Password with C++
IATHooking
Import Address Table Hooking Implementation
IPCObjects
C++ Code to perform IPC (Inter Process Connection) to share C++ Objects/Structures with other processes
SandBox-Bypass
C++ Code to Bypass Sandbox and VM via RAM and Core victim info
FreeLoaderInjector
Typical Process Injection using Opened Handle Process, RWX Memory Space