CSLDepend / exploitsLinks
We store attacks and exploits that we've found useful in our research
☆13Updated 10 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 8 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆44Updated 4 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 8 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- few months old but better than nothing☆58Updated 3 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 9 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆29Updated 9 years ago
- DNS Botnet Server and Client☆35Updated 5 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Updated 10 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆79Updated 8 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- Community maintained list of most popular HIPS service and process names on a Windows Platform.☆43Updated 2 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆52Updated 7 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- ☆54Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- Collection of IronPython scripts and executables for penetration testing☆55Updated 6 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆52Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago