JohnHammond / binnimView external linksLinks
Shitty Nim code that reads in a file and converts it into \x hex representation, for the use of shellcode binaries.
☆63Jun 28, 2023Updated 2 years ago
Alternatives and similar repositories for binnim
Users that are interested in binnim are comparing it to the libraries listed below
Sorting:
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆33Apr 12, 2023Updated 2 years ago
- Crappy Python code to render a QR code as "plaintext" with Unicode☆40Apr 20, 2024Updated last year
- Crappy Golang code to list local listening ports and their associated processes.☆34Apr 22, 2023Updated 2 years ago
- One-header configurable C++20 COFF loader☆21Jul 21, 2025Updated 6 months ago
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago
- A PoC to deploy a Sliver Agent with amsi bypass, process injection, hollowing and OpSec☆27Oct 2, 2024Updated last year
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- Website vuln example.☆11Sep 26, 2025Updated 4 months ago
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆42Jan 22, 2025Updated last year
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆13Dec 14, 2023Updated 2 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- space invaders☆12Jan 28, 2024Updated 2 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- A storytllr-based C64 fantasy text adventure☆16Feb 19, 2024Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆12May 31, 2024Updated last year
- ☆34Jul 26, 2024Updated last year
- A header file for c/c++ of the laws of physics☆11Oct 17, 2022Updated 3 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 6 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆28Sep 15, 2025Updated 4 months ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Burp Suite Certified Practitioner Exam Study☆18Feb 8, 2023Updated 3 years ago
- Power Automate C2 (PAC2) : Stealth living-off-the-cloud C2 framework.☆36Apr 16, 2024Updated last year
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆60Jan 5, 2026Updated last month
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆17May 6, 2024Updated last year
- C# wrapper for ligolo☆17Dec 9, 2021Updated 4 years ago
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- This repo for making it easy to transfer files on the OSCP exam using FTP,PUT,SMB,GET☆19Jun 21, 2024Updated last year
- Good CLR Host with Native patchless AMSI Bypass☆102Apr 18, 2025Updated 9 months ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.☆22Sep 4, 2023Updated 2 years ago
- A Burp extension to help pentesters copy requests / responses for reports.☆51Jul 8, 2025Updated 7 months ago
- ☆292Mar 31, 2022Updated 3 years ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- CLI monitor for windows process- & file activity☆98Nov 20, 2020Updated 5 years ago