IlanKalendarov / PyHookLinks
PyHook is an offensive API hooking tool written in python designed to catch various credentials within the API call.
☆190Updated 11 months ago
Alternatives and similar repositories for PyHook
Users that are interested in PyHook are comparing it to the libraries listed below
Sorting:
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆185Updated 3 months ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Updated 4 months ago
- Simple reverse shell to avoid Win 11 defender detection☆120Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆158Updated 4 years ago
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆122Updated 2 years ago
- Bypassing AppLocker with C#☆141Updated 4 years ago
- Process Ghosting Tool☆174Updated 4 years ago
- Extendable payload obfuscation and delivery framework☆144Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- Assist reverse tcp shells in post-exploration tasks☆221Updated last month
- PowerShell Asynchronous TCP Reverse Shell☆158Updated last year
- Simple rapper for Mimikatz, bypass Defender☆140Updated 3 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆189Updated 3 years ago
- Convert shellcode into different formats!☆353Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆95Updated 3 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆142Updated 3 years ago
- .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access☆158Updated 2 years ago
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆221Updated 4 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆217Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆155Updated 3 years ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆185Updated 2 years ago
- A little tool to play with Outlook☆208Updated 3 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated 2 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆158Updated 4 years ago
- pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory☆324Updated last year
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- Run Your Payload Without Running Your Payload☆181Updated 2 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆88Updated 5 years ago