808ale / CipherRunLinks
CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.
☆11Updated 2 years ago
Alternatives and similar repositories for CipherRun
Users that are interested in CipherRun are comparing it to the libraries listed below
Sorting:
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Updated 6 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- Cobalt Strike BOFS☆16Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆43Updated 10 months ago
- A C2 framework built for my bachelors thesis☆56Updated 3 weeks ago
- Check the Domain for Local Admin Access☆20Updated 11 months ago
- Remote Template Injection Toolkit☆48Updated last year
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Updated 7 months ago
- A little cheatsheet for NetExec☆32Updated last year
- Discord C2 Profile for Mythic☆33Updated 11 months ago
- A repository with my code snippets for research/education purposes.☆52Updated 2 years ago
- ☆47Updated 3 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Updated 3 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- ☆29Updated 2 years ago
- A small red team course☆40Updated 2 years ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Updated 2 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Updated 3 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- An offensive security framework for writing payloads☆18Updated 3 years ago
- My BloodHound custom queries☆26Updated 3 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆16Updated 2 years ago
- Duplicate not owned Token from Running Process☆74Updated 2 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Updated 3 years ago
- Modified version of PEAS client for offensive operations☆42Updated 3 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- ☆59Updated last year