A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload
☆51Oct 28, 2025Updated 5 months ago
Alternatives and similar repositories for ExifSmugglingPoC
Users that are interested in ExifSmugglingPoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for complete MALicious softWARE books I & II☆79Oct 10, 2025Updated 6 months ago
- ☆78Jan 1, 2026Updated 3 months ago
- ☆18Dec 23, 2024Updated last year
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Jul 11, 2025Updated 9 months ago
- Usermode NT Explorer - Query kernel addresses, translate virtual to physical addresses, inspect the PFN database, and more.☆76Mar 16, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆40Aug 5, 2025Updated 8 months ago
- A fast and powerful CLI tool for finding secrets and other data in files, web pages, and other text sources. Supports multi-threading and…☆22Apr 2, 2026Updated 2 weeks ago
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated last year
- collection of blogs about malware development and analysis☆74Dec 2, 2025Updated 4 months ago
- bind your malware or reverse shell into any file (jpg - jpeg - txt - mp4 or any format ;) )☆10Mar 26, 2019Updated 7 years ago
- PoC collection☆13Oct 1, 2020Updated 5 years ago
- ☆37Nov 8, 2024Updated last year
- Ready to go Phishing Platform☆58Oct 15, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆203Dec 30, 2025Updated 3 months ago
- ☆66Dec 19, 2024Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 7 months ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- Misery Loader to bypass modern EDR solutions☆18Dec 20, 2024Updated last year
- A New Exploitation Technique for Visual Studio Projects☆13Nov 5, 2023Updated 2 years ago
- A small How-To on creating your own weaponized WSL file☆125Jul 23, 2025Updated 8 months ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year
- ☆48Dec 21, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆127Dec 23, 2025Updated 3 months ago
- ☆36Aug 21, 2024Updated last year
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated last year
- Professional Phishing Awareness & Cybersecurity Education Platform☆24Oct 17, 2025Updated 5 months ago
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆188Mar 14, 2025Updated last year
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆42Feb 11, 2026Updated 2 months ago
- ClickForClickOnce - Generate configurable clickonce payloads☆93Oct 10, 2025Updated 6 months ago
- Simple netcat wrote in C☆16Jun 25, 2025Updated 9 months ago
- Build sneaky & malicious LNK files.☆161Jul 16, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated last year
- Lateral movement with DCOM DLL hijacking☆175Jul 4, 2025Updated 9 months ago
- This guide provides comprehensive techniques for penetration testing Active Directory environments. It covers everything from initial rec…☆21Jul 3, 2025Updated 9 months ago
- MacOS Stealer written in Rust. For Legal and Ethical Research Purposes Only.☆25Jan 3, 2025Updated last year
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 5 months ago
- Robust Cobalt Strike shellcode loader with multiple advanced evasion features☆204Apr 21, 2025Updated 11 months ago
- ☆34Mar 19, 2025Updated last year