Binject / backdoorfactoryLinks
A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.
☆379Updated 3 years ago
Alternatives and similar repositories for backdoorfactory
Users that are interested in backdoorfactory are comparing it to the libraries listed below
Sorting:
- A modular C2 framework☆482Updated 3 months ago
- A Golang implant that uses Slack as a command and control server☆462Updated 2 years ago
- Flamingo captures credentials sprayed across the network by various IT and security products.☆454Updated 3 months ago
- Multiplatform reverse shell generator☆589Updated 5 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆489Updated 4 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆782Updated last year
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆521Updated 3 years ago
- Injects additional machine instructions into various binary formats.☆283Updated last year
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆213Updated 4 years ago
- A wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.☆622Updated 2 years ago
- Dump ntds.dit really fast☆397Updated 3 years ago
- Easy files and payloads delivery over DNS☆423Updated last year
- An open source swiss army knife for arbitrary communication over application protocols☆241Updated 4 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254Updated 2 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆924Updated 4 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆382Updated 4 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆232Updated 4 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆612Updated 2 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆380Updated 5 years ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆511Updated 2 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,122Updated 2 months ago
- Golang reverse/bind shell generator☆229Updated 3 years ago
- ☆169Updated 7 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆350Updated 5 years ago
- Generates malicious LNK file payloads for data exfiltration☆409Updated 7 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆222Updated 4 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆143Updated 3 years ago
- ☆334Updated 2 years ago
- A polyglot payload generator☆242Updated 2 years ago
- Open source pre-operation C2 server based on python and powershell☆753Updated 4 years ago