{"id":22647371,"url":"https://github.com/processust/payloaddropper","last_synced_at":"2026-01-07T16:44:33.126Z","repository":{"id":44428883,"uuid":"345153006","full_name":"ProcessusT/PayloadDropper","owner":"ProcessusT","description":"Un dropper de payload indétectable qui désactive l'antivirus Windows Defender puis paramètre un fichier batch à l'ouverture de session de l'utilisateur courant pour télécharger netcat et initier une connexion de type reverse shell vers un serveur C2.","archived":false,"fork":false,"pushed_at":"2021-03-06T17:27:49.000Z","size":2,"stargazers_count":14,"open_issues_count":0,"forks_count":5,"subscribers_count":2,"default_branch":"main","last_synced_at":"2025-02-03T20:02:59.357Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"Batchfile","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/ProcessusT.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2021-03-06T17:25:14.000Z","updated_at":"2025-01-29T11:27:12.000Z","dependencies_parsed_at":"2022-08-31T21:00:29.497Z","dependency_job_id":null,"html_url":"https://github.com/ProcessusT/PayloadDropper","commit_stats":null,"previous_names":["processust/payloaddropper"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FPayloadDropper","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FPayloadDropper/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FPayloadDropper/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ProcessusT%2FPayloadDropper/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/ProcessusT","download_url":"https://codeload.github.com/ProcessusT/PayloadDropper/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":246150409,"owners_count":20731419,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-12-09T07:33:27.830Z","updated_at":"2026-01-07T16:44:28.103Z","avatar_url":"https://github.com/ProcessusT.png","language":"Batchfile","readme":"# PayloadDropper\nUn dropper de payload indétectable qui désactive l'antivirus Windows Defender puis paramètre un fichier batch à l'ouverture de session de l'utilisateur courant pour télécharger netcat et initier une connexion de type reverse shell vers un serveur C2.\n\nLes fichiers fournis ici sont à but instructif uniquement.\n\nJe ne pourrais être tenu responsable de leur utilisation.\n\nLa vidéo qui traite des outils : https://peertube.lestutosdeprocessus.fr/videos/watch/41ea87e7-5a76-40b5-bf62-12ed6a1ed56d\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fprocessust%2Fpayloaddropper","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fprocessust%2Fpayloaddropper","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fprocessust%2Fpayloaddropper/lists"}