A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload
☆51Oct 28, 2025Updated 6 months ago
Alternatives and similar repositories for ExifSmugglingPoC
Users that are interested in ExifSmugglingPoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for complete MALicious softWARE books I & II☆79Oct 10, 2025Updated 6 months ago
- Modify machine code in binaries with alternative x64 assembly opcodes for AV evasion☆139Updated this week
- ☆78Jan 1, 2026Updated 4 months ago
- Atomic test units for BOF execution☆55Apr 26, 2026Updated last week
- ☆18Dec 23, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆24Jul 11, 2025Updated 9 months ago
- Usermode NT Explorer - Query kernel addresses, translate virtual to physical addresses, inspect the PFN database, and more.☆83Mar 16, 2026Updated last month
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆41Aug 5, 2025Updated 9 months ago
- A fast and powerful CLI tool for finding secrets and other data in files, web pages, and other text sources. Supports multi-threading and…☆22Apr 2, 2026Updated last month
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated last year
- Static analysis & exploitation-triage toolkit for Windows kernel drivers. Discover IOCTLs, Symbolic Links, and check cert , and Downlaods…☆133Apr 27, 2026Updated last week
- PoC collection☆13Oct 1, 2020Updated 5 years ago
- collection of blogs about malware development and analysis☆73Dec 2, 2025Updated 5 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- bind your malware or reverse shell into any file (jpg - jpeg - txt - mp4 or any format ;) )☆11Mar 26, 2019Updated 7 years ago
- ☆37Nov 8, 2024Updated last year
- Ready to go Phishing Platform☆56Oct 15, 2024Updated last year
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆205Dec 30, 2025Updated 4 months ago
- ☆67Dec 19, 2024Updated last year
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 8 months ago
- Misery Loader to bypass modern EDR solutions☆19Dec 20, 2024Updated last year
- A New Exploitation Technique for Visual Studio Projects☆13Nov 5, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A small How-To on creating your own weaponized WSL file☆126Jul 23, 2025Updated 9 months ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- ☆48Dec 21, 2025Updated 4 months ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆128Dec 23, 2025Updated 4 months ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated last year
- ☆36Aug 21, 2024Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆189Mar 14, 2025Updated last year
- Professional Phishing Awareness & Cybersecurity Education Platform☆24Oct 17, 2025Updated 6 months ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆41Feb 11, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ClickForClickOnce - Generate configurable clickonce payloads☆93Apr 17, 2026Updated 2 weeks ago
- Simple netcat wrote in C☆15Jun 25, 2025Updated 10 months ago
- Build sneaky & malicious LNK files.☆160Jul 16, 2025Updated 9 months ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆116Apr 22, 2026Updated 2 weeks ago
- Elfina is a multi-architecture ELF loader written in Rust, supporting x86 and x86-64 binaries.☆46Mar 15, 2026Updated last month
- Lateral movement with DCOM DLL hijacking☆178Jul 4, 2025Updated 10 months ago