A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload
☆51Oct 28, 2025Updated 4 months ago
Alternatives and similar repositories for ExifSmugglingPoC
Users that are interested in ExifSmugglingPoC are comparing it to the libraries listed below
Sorting:
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Jul 11, 2025Updated 7 months ago
- ☆18Dec 23, 2024Updated last year
- Ready to go Phishing Platform☆57Oct 15, 2024Updated last year
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated 11 months ago
- Usermode NT Explorer - Query kernel addresses, translate virtual to physical addresses, inspect the PFN database, and more.☆72Jan 27, 2026Updated last month
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- ☆64Dec 19, 2024Updated last year
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆38Aug 5, 2025Updated 7 months ago
- collection of blogs about malware development and analysis☆65Dec 2, 2025Updated 3 months ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆64Dec 25, 2025Updated 2 months ago
- Source code for complete MALicious softWARE books I & II☆78Oct 10, 2025Updated 4 months ago
- ☆37Nov 8, 2024Updated last year
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆122Dec 23, 2025Updated 2 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆199Dec 30, 2025Updated 2 months ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- ☆49Dec 21, 2025Updated 2 months ago
- ☆33Mar 19, 2025Updated 11 months ago
- ☆75Jan 1, 2026Updated 2 months ago
- Windows Thread Pool Injection Havoc Implementation☆33Mar 23, 2024Updated last year
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- Mockingjay process self injection POC☆48Aug 8, 2023Updated 2 years ago
- ☆36Aug 21, 2024Updated last year
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆87Feb 9, 2026Updated 3 weeks ago
- A small How-To on creating your own weaponized WSL file☆122Jul 23, 2025Updated 7 months ago
- Commandline spoofing on Windows☆94Nov 25, 2025Updated 3 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- Signature finder (from PE-bear)☆40Aug 25, 2025Updated 6 months ago
- Starter template for vue 3 applications with theme switching, registration, authentication, email verification, and the best 404 Not Foun…☆11Jan 28, 2022Updated 4 years ago
- A POC for developing BOFs for Sliver, Havoc, Cobalt Strike or most COFFLoaders in Rust.☆74Aug 24, 2025Updated 6 months ago
- Group Policy Objects manipulation and exploitation framework☆292Dec 7, 2025Updated 2 months ago
- Local SYSTEM auth trigger for relaying - X☆155Jul 23, 2025Updated 7 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆186Mar 14, 2025Updated 11 months ago
- ☆108Aug 21, 2024Updated last year
- ☆15Aug 5, 2025Updated 7 months ago
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated 11 months ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- Lateral movement with DCOM DLL hijacking☆176Jul 4, 2025Updated 8 months ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- My dotfiles☆10Jul 31, 2024Updated last year