Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.
☆15Jul 17, 2025Updated 7 months ago
Alternatives and similar repositories for NetRunners
Users that are interested in NetRunners are comparing it to the libraries listed below
Sorting:
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- C2 Infrastructure Automation☆119Jun 21, 2025Updated 8 months ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- ☆34May 14, 2018Updated 7 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 3 years ago
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆13Dec 14, 2023Updated 2 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated last year
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- A C# Source Generator for obfuscating string or byte array values using multi-byte xor encryption.☆14Jun 12, 2024Updated last year
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 3 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- ☆20Mar 21, 2024Updated last year
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆15Apr 26, 2021Updated 4 years ago
- Bypass Windows Defender with C++ .DLL Payload File - Meterpreter Reverse Shell☆47Apr 15, 2023Updated 2 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- Burp Suite Certified Practitioner Exam Study☆18Feb 8, 2023Updated 3 years ago
- Flexible C# shellcode runner☆39Jan 18, 2022Updated 4 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆21Oct 13, 2018Updated 7 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- Do some DLL SideLoading magic☆89Sep 20, 2023Updated 2 years ago
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- Knowledge Management for Offensive Security Professionals Official Repository☆152Feb 25, 2025Updated last year
- wpDiscuz 7.0.4 Remote Code Execution☆18Jun 15, 2021Updated 4 years ago
- ☆24Feb 1, 2025Updated last year
- File and executable crypter with comprehensible GUI and built-in anti-malicious use☆21Sep 3, 2020Updated 5 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated last year