CompeyDev / nemoLinks
Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).
☆14Updated 2 years ago
Alternatives and similar repositories for nemo
Users that are interested in nemo are comparing it to the libraries listed below
Sorting:
- Yet, Another Packer/Loader☆25Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 4 years ago
- Basic Dart reverse shell code☆21Updated 2 years ago
- WMI SA stuffs☆30Updated 3 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Updated 3 years ago
- A python port of CCob's ThreadlessInject☆25Updated 2 years ago
- Small POC for process ghosting☆40Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Updated 2 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Updated 2 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Updated 4 years ago
- Source Code Management Attack Toolkit☆13Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 3 years ago
- Execute Mimikatz with different technique☆51Updated 4 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- Deobfuscation of XorStringsNet☆14Updated last year
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆21Updated last month
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆30Updated 2 years ago
- ☆19Updated 3 years ago
- PoCs of (outdated) privilege escalation vulnerability☆13Updated 11 months ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆39Updated 3 years ago