CoolerVoid / jasonkiller
☆11Updated this week
Related projects: ⓘ
- ☆10Updated this week
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- CVE-2020-0688☆10Updated 4 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated last year
- Execute Shellcode And Other Goodies From MMC☆12Updated 9 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆14Updated 4 years ago
- ☆12Updated this week
- Abuses Powershell Profiles☆13Updated 8 years ago
- module for certexfil☆15Updated 2 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago
- Collection of cracked malware☆14Updated 5 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆11Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆20Updated last year
- ☆18Updated this week
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆26Updated 7 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆13Updated 6 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆17Updated 3 years ago
- Public exploits☆15Updated 6 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- Identify common attack paths to get Domain Administrator☆21Updated 5 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 6 years ago
- ☆21Updated this week
- ☆14Updated 4 years ago
- C & Shellcode Playground..☆11Updated 6 years ago