IlanKalendarov / PyHookLinks
PyHook is an offensive API hooking tool written in python designed to catch various credentials within the API call.
☆190Updated last year
Alternatives and similar repositories for PyHook
Users that are interested in PyHook are comparing it to the libraries listed below
Sorting:
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Updated 10 months ago
- Extendable payload obfuscation and delivery framework☆146Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 4 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Updated 4 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆124Updated 3 years ago
- Simple rapper for Mimikatz, bypass Defender☆137Updated 4 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆88Updated 4 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Updated 2 months ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆202Updated 6 months ago
- Bypassing AppLocker with C#☆144Updated 4 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- Simple reverse shell to avoid Win 11 defender detection☆122Updated 4 years ago
- CVE-2021-40444☆66Updated 4 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135Updated 2 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆187Updated 6 months ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆144Updated 4 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated 2 years ago
- An AV exclusion enumeration tool written in Python.☆60Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆107Updated 3 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆221Updated 3 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Updated 6 years ago
- ☆95Updated 3 years ago
- A little tool to play with Outlook☆207Updated 4 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- A simple HTTP server for delivering and exfiltrating files/data during, for example, CTFs.☆80Updated 6 months ago
- Malicious Shortcut(.lnk) Generator☆86Updated 7 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆162Updated 4 years ago
- DLL Hijack Search Order Enumeration BOF☆150Updated 4 years ago