Binject / backdoorfactoryLinks
A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.
☆380Updated 4 years ago
Alternatives and similar repositories for backdoorfactory
Users that are interested in backdoorfactory are comparing it to the libraries listed below
Sorting:
- A modular C2 framework☆503Updated last week
- Injects additional machine instructions into various binary formats.☆288Updated last year
- Flamingo captures credentials sprayed across the network by various IT and security products.☆487Updated 2 weeks ago
- A Golang implant that uses Slack as a command and control server☆462Updated 2 years ago
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆525Updated 4 years ago
- Multiplatform reverse shell generator☆592Updated 5 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆807Updated 2 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆245Updated 5 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Updated 5 years ago
- A wrapper around a pre-compiled version of the Mimikatz executable for the purpose of anti-virus evasion.☆627Updated 3 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆231Updated 5 years ago
- This is a weaponized WSUS exploit☆299Updated 3 years ago
- Yet another shellcode runner consists of different techniques for evaluating detection capabilities of endpoint security solutions☆494Updated 4 years ago
- Easy files and payloads delivery over DNS☆424Updated 3 weeks ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆385Updated 5 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆931Updated 4 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆522Updated 3 years ago
- Dump ntds.dit really fast☆409Updated 4 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆386Updated 5 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254Updated 2 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆227Updated 6 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆704Updated last year
- Automating juicy potato local privilege escalation exploit for penetration testers☆146Updated 4 years ago
- Search for potential frontable domains☆644Updated 2 years ago
- Explore the network using VPNPivot tool☆274Updated 9 years ago
- ☆174Updated 8 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆249Updated 5 years ago
- Golang reverse/bind shell generator☆229Updated 4 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆402Updated 5 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆350Updated 6 years ago