Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform
☆18Apr 17, 2024Updated last year
Alternatives and similar repositories for pyMetaTwin
Users that are interested in pyMetaTwin are comparing it to the libraries listed below
Sorting:
- Proxll is a tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆41Oct 8, 2024Updated last year
- ☆11Apr 2, 2022Updated 3 years ago
- Simple C2 using GitHub repository as comms channel.☆32Oct 26, 2024Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- ☆18Sep 24, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- ☆18Oct 28, 2025Updated 4 months ago
- Cobalt Strike random C2 Profile generator☆16Feb 23, 2026Updated last week
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 11 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- C2 Infrastructure Automation☆119Jun 21, 2025Updated 8 months ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 3 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 3 months ago
- Aggressor script add-in for CobaltStrike to track file uploads☆48Nov 7, 2022Updated 3 years ago
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- ☆18Dec 9, 2023Updated 2 years ago
- ☆20Nov 5, 2025Updated 3 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆40Jan 14, 2024Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- Keep it secret, keep it safe☆78Feb 6, 2025Updated last year
- RDPThief donut shellcode inject into mstsc☆88May 24, 2021Updated 4 years ago
- ☆23Apr 28, 2024Updated last year
- ☆27May 6, 2024Updated last year
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- BOF combination of KillDefender and Backstab☆167Mar 23, 2023Updated 2 years ago
- Execute commands in other Sessions☆91Jul 29, 2024Updated last year
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- ☆88Jul 31, 2022Updated 3 years ago
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆138Jul 23, 2024Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- Click Once + App Domain☆64Feb 23, 2026Updated last week
- ☆52Apr 1, 2022Updated 3 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆108Apr 18, 2024Updated last year
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago