Binject / backdoorfactoryLinks
A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.
☆379Updated 3 years ago
Alternatives and similar repositories for backdoorfactory
Users that are interested in backdoorfactory are comparing it to the libraries listed below
Sorting:
- A modular C2 framework☆483Updated this week
- Flamingo captures credentials sprayed across the network by various IT and security products.☆454Updated this week
- A Golang implant that uses Slack as a command and control server☆463Updated 2 years ago
- Injects additional machine instructions into various binary formats.☆283Updated last year
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆213Updated 4 years ago
- Multiplatform reverse shell generator☆590Updated 5 years ago
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆522Updated 3 years ago
- A wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.☆623Updated 2 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆783Updated last year
- Easy files and payloads delivery over DNS☆422Updated last year
- An open source swiss army knife for arbitrary communication over application protocols☆241Updated 4 years ago
- Dump ntds.dit really fast☆400Updated 3 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆491Updated 4 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆923Updated 4 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆612Updated 2 years ago
- Golang reverse/bind shell generator☆229Updated 3 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆233Updated 5 years ago
- This is a weaponized WSUS exploit☆286Updated 2 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆378Updated 5 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆255Updated 2 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆246Updated 4 years ago
- ☆170Updated 7 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆519Updated 2 years ago
- Explore the network using VPNPivot tool☆270Updated 9 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆179Updated 2 years ago
- A WebSocket C2 Tool☆401Updated 7 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆699Updated last year
- A collection of tools to abuse chrome browser☆295Updated 4 years ago
- Donut Injector ported to pure Go. For use with https://github.com/TheWover/donut☆342Updated 2 years ago
- Search for potential frontable domains☆632Updated 2 years ago