Binject / backdoorfactoryLinks
A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.
☆380Updated 4 years ago
Alternatives and similar repositories for backdoorfactory
Users that are interested in backdoorfactory are comparing it to the libraries listed below
Sorting:
- A modular C2 framework☆492Updated last week
- A Golang implant that uses Slack as a command and control server☆463Updated 2 years ago
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆525Updated 3 years ago
- Injects additional machine instructions into various binary formats.☆287Updated last year
- Flamingo captures credentials sprayed across the network by various IT and security products.☆483Updated 3 months ago
- Multiplatform reverse shell generator☆592Updated 5 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆795Updated last year
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆213Updated 5 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆492Updated 4 years ago
- A wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.☆627Updated 3 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆929Updated 4 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆244Updated 4 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆256Updated 2 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆520Updated 3 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆232Updated 5 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆382Updated 5 years ago
- Dump ntds.dit really fast☆408Updated 4 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆609Updated 3 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆384Updated 4 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆383Updated 5 years ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆525Updated 3 years ago
- ☆333Updated 2 years ago
- Golang reverse/bind shell generator☆229Updated 3 years ago
- Easy files and payloads delivery over DNS☆424Updated last year
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆181Updated 2 years ago
- This is a weaponized WSUS exploit☆296Updated 3 years ago
- A tool to make socks connections through HTTP agents☆717Updated 4 years ago
- Hershell is a simple TCP reverse shell written in Go.☆531Updated 6 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆349Updated 6 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆255Updated 3 years ago