ByteJunkies-co-uk / MetsubushiView external linksLinks
Generate droppers with encrypted payloads automatically.
☆54Nov 16, 2021Updated 4 years ago
Alternatives and similar repositories for Metsubushi
Users that are interested in Metsubushi are comparing it to the libraries listed below
Sorting:
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 4 years ago
- Extendable payload obfuscation and delivery framework☆146Nov 4, 2022Updated 3 years ago
- ☆55Nov 11, 2021Updated 4 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 4 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- ☆53Apr 1, 2022Updated 3 years ago
- Collection of CobaltStrike beacon object files☆105Feb 14, 2022Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Oct 10, 2022Updated 3 years ago
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆106Feb 19, 2022Updated 3 years ago
- ☆142May 4, 2022Updated 3 years ago
- ☆129Mar 1, 2023Updated 2 years ago
- ☆22May 29, 2020Updated 5 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆231Jul 30, 2020Updated 5 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆229Jul 30, 2021Updated 4 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆61Jul 10, 2024Updated last year
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆321Sep 23, 2022Updated 3 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆41Sep 3, 2020Updated 5 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆101Sep 30, 2020Updated 5 years ago
- Modular Enumeration and Password Spraying Framework☆129Apr 10, 2024Updated last year
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Sep 29, 2021Updated 4 years ago
- Easy red team phishing with Puppeteer☆133Feb 6, 2023Updated 3 years ago
- ☆80Aug 2, 2023Updated 2 years ago
- Obtain and parse SSL certificates☆86Nov 19, 2021Updated 4 years ago
- ☆61Aug 30, 2021Updated 4 years ago