IlanKalendarov / PyHookLinks
PyHook is an offensive API hooking tool written in python designed to catch various credentials within the API call.
☆190Updated 10 months ago
Alternatives and similar repositories for PyHook
Users that are interested in PyHook are comparing it to the libraries listed below
Sorting:
- WIP shellcode loader in nim with EDR evasion techniques☆217Updated 3 years ago
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆122Updated 2 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Updated 3 months ago
- Simple reverse shell to avoid Win 11 defender detection☆119Updated 3 years ago
- Run Your Payload Without Running Your Payload☆182Updated 2 years ago
- grim reaper c2☆339Updated 2 years ago
- Convert shellcode into different formats!☆353Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- Bypassing AppLocker with C#☆141Updated 3 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆181Updated 2 months ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆138Updated 2 years ago
- pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory☆317Updated last year
- Get fresh Syscalls from a fresh ntdll.dll copy☆232Updated 3 years ago
- Shellcode launcher for AV bypass☆215Updated last year
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆186Updated 3 years ago
- Process Ghosting Tool☆174Updated 4 years ago
- A technique of hiding malicious shellcode via Shannon encoding.☆256Updated 2 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆155Updated 3 years ago
- RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows☆7Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆158Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 3 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆267Updated 2 years ago
- MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.☆260Updated last year
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- Extendable payload obfuscation and delivery framework☆144Updated 2 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆279Updated 7 months ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆379Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆301Updated 2 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆323Updated 2 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Updated last year