IlanKalendarov / PyHook
PyHook is an offensive API hooking tool written in python designed to catch various credentials within the API call.
☆181Updated 6 months ago
Alternatives and similar repositories for PyHook:
Users that are interested in PyHook are comparing it to the libraries listed below
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆256Updated 3 years ago
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆121Updated 2 years ago
- A multi-platform HTTP(S) Reverse Shell Server and Client in Python 3☆100Updated 2 years ago
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆185Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆112Updated 2 years ago
- Simple reverse shell to avoid Win 11 defender detection☆118Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆157Updated 3 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆273Updated 4 months ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆147Updated 3 years ago
- PowerShell Asynchronous TCP Reverse Shell☆155Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated last year
- Bypassing AppLocker with C#☆138Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 3 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆274Updated 3 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆227Updated 3 years ago
- Assist reverse tcp shells in post-exploration tasks☆216Updated 11 months ago
- PickleC2 is a post-exploitation and lateral movements framework☆90Updated 3 years ago
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆213Updated 4 years ago
- Process Ghosting Tool☆169Updated 3 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆300Updated 3 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆170Updated last week
- Fully modular persistence framework☆251Updated last year
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆142Updated 3 years ago
- C# Lsass parser☆284Updated 3 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆155Updated 3 years ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆162Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆300Updated last year
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆182Updated 3 years ago
- Extendable payload obfuscation and delivery framework☆141Updated 2 years ago
- (Demo) 3rd party agent for Havoc☆131Updated last year