MohamedMostafa010 / ExeRayLinks
ExeShield AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incident response. Built with Python and scikit-learn.
☆21Updated 3 weeks ago
Alternatives and similar repositories for ExeRay
Users that are interested in ExeRay are comparing it to the libraries listed below
Sorting:
- PowerShell script to generate ShellCode in various formats☆42Updated 9 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆92Updated 8 months ago
- ☆55Updated 8 months ago
- Repo for all my exploits/PoCs☆51Updated last month
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- POC of GITHUB simple C2 in rust☆53Updated 5 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 3 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Windows Administrator level Implant.☆49Updated 8 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 9 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- Windows Thread Pool Injection Havoc Implementation☆30Updated last year
- LSTAR - CobaltStrike Translated to EN☆17Updated 2 years ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆71Updated last year
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆36Updated 2 weeks ago
- ☆57Updated 7 months ago
- RCE PoC for Empire C2 framework <5.9.3☆28Updated last year
- .NET tool used to enrich RPC telemetry☆63Updated 2 weeks ago
- Utilizng an MCP Server to communicate with your C2☆75Updated last month
- ☆29Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆24Updated 5 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆32Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆22Updated 10 months ago
- Situational Awareness script to identify how and where to run implants☆52Updated 6 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆98Updated last week
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 8 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆41Updated last month
- Dump Linux keyrings☆20Updated 11 months ago
- ☆34Updated 2 months ago