Kiosec / Windows-ExploitationLinks
Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.
☆8Updated 2 months ago
Alternatives and similar repositories for Windows-Exploitation
Users that are interested in Windows-Exploitation are comparing it to the libraries listed below
Sorting:
- ☆57Updated 7 months ago
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆19Updated 2 years ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆28Updated last year
- PowerShell script to generate ShellCode in various formats☆42Updated 9 months ago
- .bin file to shellcode convertor☆38Updated 11 months ago
- ☆27Updated 2 years ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆26Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆36Updated 6 months ago
- Simple Shellcode Loader tool☆26Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Used to get NTLMv2 Hashes from SMB☆14Updated 8 months ago
- Malicious powershell scripts loader designed to avoid detection.☆50Updated 2 years ago
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- ☆42Updated this week
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆39Updated last year
- Create Anti-Copy DRM Malware☆58Updated 10 months ago
- Situational Awareness script to identify how and where to run implants☆52Updated 6 months ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆12Updated last month
- exfiltration/infiltration toolkit☆23Updated last year
- C# havoc implant☆100Updated 2 years ago
- execute PE in memory Filelessly☆43Updated 4 months ago
- Inject RDPThief into memory with PowerShell.☆64Updated 5 months ago
- Duplicate not owned Token from Running Process☆72Updated last year