0x6rss / pdfdropperLinks
PDF dropper Red Team Scenairos
☆208Updated 10 months ago
Alternatives and similar repositories for pdfdropper
Users that are interested in pdfdropper are comparing it to the libraries listed below
Sorting:
- Extract and execute a PE embedded within a PNG file using an LNK file.☆417Updated 7 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆161Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆96Updated 2 months ago
- Ghosting-AMSI☆180Updated last month
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆190Updated 2 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆152Updated last year
- Reverse shell that can bypass windows defender detection☆166Updated last year
- yet another AV killer tool using BYOVD☆270Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆157Updated last year
- ☆164Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆141Updated 4 months ago
- 「💀」Proof of concept on BYOVD attack☆159Updated 5 months ago
- Continuous password spraying tool☆186Updated 3 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆148Updated 11 months ago
- AV bypass while you sip your Chai!☆222Updated last year
- BOF to steal browser cookies & credentials☆302Updated last month
- An aggressor script that can help automate payload building in Cobalt Strike☆117Updated last year
- Chrome browser extension-based Command & Control☆141Updated 3 months ago
- ☆322Updated 2 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆248Updated last year
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆283Updated last month
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆180Updated last month
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆144Updated last month
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆254Updated 9 months ago
- Persistent Powershell backdoor tool {😈}☆119Updated 10 months ago
- ☆136Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆183Updated last month
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆417Updated 9 months ago
- ☆164Updated last year
- A shellcode injection tool showcasing various process injection techniques☆137Updated last year