Hackndo / miscLinks
Tools I wrote for personal use in C, Python, Powershell, Bash, ...
☆46Updated 6 years ago
Alternatives and similar repositories for misc
Users that are interested in misc are comparing it to the libraries listed below
Sorting:
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- ☆36Updated 7 years ago
- Sustainable shellcode evasion☆111Updated 8 months ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- A bunch of my exploit development helper tools, collected in one place.☆142Updated 3 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆228Updated 6 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated 10 months ago
- Run commands on linux through those pesky firewalls☆26Updated 10 years ago
- Dll that can be used for side loading and other attack vector.☆202Updated 4 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆143Updated 3 years ago
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆123Updated 2 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated last year
- Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.☆204Updated 8 years ago
- Tool to extract Kerberos tickets from Linux kernel keys.☆231Updated 6 years ago
- Scripts I used during CTP☆67Updated 5 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆145Updated 4 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Updated 6 years ago
- Linux privilege escalation via LXD☆138Updated 5 years ago
- CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way☆78Updated 6 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- Platform independent peCloak fork based on Capstone☆106Updated 9 years ago
- Winsock accept() Backdoor Implant.☆116Updated 4 years ago
- Managed code hooking template.☆108Updated 4 years ago
- Proxy system calls over an RPC channel☆99Updated 3 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago