Leo4j / ShellGen
PowerShell script to generate ShellCode in various formats
☆22Updated 2 weeks ago
Related projects: ⓘ
- A pure C version of SymProcAddress☆23Updated 6 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆17Updated 3 weeks ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32Updated 3 months ago
- DFSCoerce exe revisited version with custom authentication☆34Updated 8 months ago
- Cobalt Strike BOFS☆16Updated 8 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated 11 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 4 months ago
- ☆45Updated last year
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆11Updated 10 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆20Updated this week
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆41Updated last month
- Source code and examples for PassiveAggression☆54Updated 3 months ago
- exfiltration/infiltration toolkit☆23Updated 9 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆41Updated last year
- Extension functionality for the NightHawk operator client☆26Updated 10 months ago
- ☆14Updated 3 months ago
- ☆23Updated last year
- ☆27Updated this week
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated 9 months ago
- RCE PoC for Empire C2 framework <5.9.3☆25Updated 6 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB)☆34Updated last month
- Items related to the RedELK workshop given at security conferences☆25Updated 11 months ago
- ☆35Updated 9 months ago
- Just another Process Injection using Process Hollowing technique.☆16Updated last year
- ☆57Updated 9 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆38Updated 3 months ago
- ☆24Updated 10 months ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆50Updated last year
- A simple rpc2socks alternative in pure Go.☆23Updated 2 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 2 months ago