MRGEffitas / Ironsquirrel
Encrypted exploit delivery for the masses
☆260Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Ironsquirrel
- Teaching old shellcode new tricks☆203Updated 7 years ago
- A PowerShell example of the Windows zero day priv esc☆321Updated 6 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆312Updated 6 years ago
- JavaScript Reversed TCP Meterpreter Stager☆136Updated 7 years ago
- some pocs for antivirus evasion☆129Updated last year
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆146Updated 6 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆368Updated 9 months ago
- (extensible) Data Exfiltration Toolkit (DET)☆158Updated 5 years ago
- Exploits and advisories☆189Updated 4 years ago
- ☆122Updated 6 years ago
- Fork of mona.py with x64dbg support☆99Updated 2 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆278Updated 7 years ago
- VerSprite Security Research☆163Updated last year
- Pazuzu: Reflective DLL to run binaries from memory☆211Updated 4 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆219Updated 5 years ago
- Explore the network using VPNPivot tool☆268Updated 8 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆147Updated 5 years ago
- A simple embedded Linux backdoor.☆194Updated 4 years ago
- UAC 0day, all day!☆276Updated 7 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- ☆229Updated 6 years ago
- Local UNIX PrivEsc Aggregation☆245Updated 8 years ago
- Public work for CVE-2019-0708☆289Updated 5 years ago
- Automated Exploit generation with WinDBG☆188Updated 8 years ago
- Remote Recon and Collection☆447Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Updated 6 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆84Updated 5 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Updated 6 years ago
- Snarf man-in-the-middle / relay suite☆202Updated 8 years ago