Binject / backdoorfactoryLinks
A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.
☆378Updated 4 years ago
Alternatives and similar repositories for backdoorfactory
Users that are interested in backdoorfactory are comparing it to the libraries listed below
Sorting:
- A modular C2 framework☆484Updated 3 weeks ago
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆524Updated 3 years ago
- Injects additional machine instructions into various binary formats.☆286Updated last year
- 🕳 godoh - A DNS-over-HTTPS C2☆784Updated last year
- A Golang implant that uses Slack as a command and control server☆464Updated 2 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆213Updated 4 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆493Updated 4 years ago
- Flamingo captures credentials sprayed across the network by various IT and security products.☆474Updated 2 weeks ago
- An open source swiss army knife for arbitrary communication over application protocols☆242Updated 4 years ago
- Easy files and payloads delivery over DNS☆422Updated last year
- Multiplatform reverse shell generator☆591Updated 5 years ago
- Dump ntds.dit really fast☆403Updated 3 years ago
- ☆172Updated 7 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆256Updated 2 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆234Updated 5 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆228Updated 6 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆381Updated 5 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆927Updated 4 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆519Updated 2 years ago
- This is a weaponized WSUS exploit☆288Updated 2 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆146Updated 4 years ago
- A Simple Linux ELF Runtime Crypter☆259Updated 5 months ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆381Updated 5 years ago
- A wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.☆623Updated 2 years ago
- Search for potential frontable domains☆635Updated 2 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆350Updated 5 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆246Updated 5 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆383Updated 4 years ago
- Golang reverse/bind shell generator☆229Updated 3 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆612Updated 3 years ago