IlanKalendarov / PyHookLinks
PyHook is an offensive API hooking tool written in python designed to catch various credentials within the API call.
☆192Updated 11 months ago
Alternatives and similar repositories for PyHook
Users that are interested in PyHook are comparing it to the libraries listed below
Sorting:
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆158Updated 4 years ago
- Simple reverse shell to avoid Win 11 defender detection☆121Updated 3 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Updated 4 months ago
- PickleC2 is a post-exploitation and lateral movements framework☆95Updated 4 years ago
- Extendable payload obfuscation and delivery framework☆145Updated 2 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆186Updated this week
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆143Updated 3 years ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- Bypassing AppLocker with C#☆141Updated 4 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Updated last year
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆185Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated 2 years ago
- Simple rapper for Mimikatz, bypass Defender☆140Updated 3 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆158Updated 4 years ago
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆157Updated 3 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆219Updated 3 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆114Updated 2 years ago
- A little tool to play with Outlook☆208Updated 3 years ago
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆123Updated 2 years ago
- A technique of hiding malicious shellcode via Shannon encoding.☆255Updated 2 years ago
- CVE-2021-40444☆65Updated 3 years ago
- Simple DLL that add a user to the local Administrators group☆78Updated 3 years ago
- A basic c2 / agent.☆119Updated 5 years ago
- Weaponizing for privileged file writes bugs with PrintNotify Service☆134Updated 3 years ago
- ☆165Updated last year
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated last year
- Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)☆195Updated 3 years ago
- Python port of MailSniper to exfiltrate emails via EWS endpoint☆88Updated 3 years ago