Right-To-Left Override POC
☆36Mar 21, 2022Updated 3 years ago
Alternatives and similar repositories for rtlo-attack
Users that are interested in rtlo-attack are comparing it to the libraries listed below
Sorting:
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Apr 6, 2022Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆220Mar 30, 2022Updated 3 years ago
- D/Invoke implementation in Nim☆101Jun 8, 2022Updated 3 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆81Mar 30, 2023Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 6 years ago
- ☆65Jan 2, 2024Updated 2 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆235Jan 28, 2022Updated 4 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- Active Directory Password Spray Testing Utility in Go☆18Mar 22, 2024Updated last year
- ☆43Jul 17, 2025Updated 7 months ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Jun 2, 2022Updated 3 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆69Apr 12, 2022Updated 3 years ago
- ☆121Jun 17, 2022Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆187Jun 22, 2022Updated 3 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆115Oct 21, 2023Updated 2 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- A simple COM server which provides a component to run shellcode☆149May 12, 2020Updated 5 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆101Mar 27, 2022Updated 3 years ago
- ☆215Feb 20, 2026Updated last week
- MS-FSRVP coercion abuse PoC☆303Dec 30, 2021Updated 4 years ago
- ☆21Jul 24, 2022Updated 3 years ago
- Swift code to programmatically perform dylib injection☆52Oct 29, 2022Updated 3 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆140Sep 12, 2022Updated 3 years ago
- PowerShell Obfuscation and Data Science☆180May 4, 2022Updated 3 years ago
- Hiding GoPhish from the boys in blue☆202Dec 6, 2022Updated 3 years ago
- Sleep Obfuscation☆816Dec 3, 2023Updated 2 years ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆64Feb 8, 2022Updated 4 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- CVE-2020–9934 POC☆23Jul 28, 2020Updated 5 years ago