NYAN-x-CAT / OSEP-Code-SnippetsLinks
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
☆10Updated 4 years ago
Alternatives and similar repositories for OSEP-Code-Snippets
Users that are interested in OSEP-Code-Snippets are comparing it to the libraries listed below
Sorting:
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆30Updated 3 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 4 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆16Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆28Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Injecting shellcode into a process memory and executing it in C#☆52Updated 2 years ago
- Another AMSI bypass - but in C++.☆23Updated 2 years ago
- Test antiviruses☆12Updated last year
- Extracting Syscall Stub, Modernized☆65Updated 3 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆43Updated last year
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Updated 4 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- NanoCore rat stub source code☆38Updated 3 years ago
- ☆11Updated 2 years ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆43Updated 9 months ago
- This script make any windows compatible with RDP connection☆21Updated last month
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆31Updated 2 years ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆60Updated 2 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- using the gpu to hide your payload☆59Updated 3 years ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆31Updated 4 months ago
- BitRat Source Code☆42Updated 4 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆34Updated 4 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Updated 3 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆92Updated last year
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- Bypass Windows defender syscall☆19Updated 4 years ago