NYAN-x-CAT / OSEP-Code-Snippets
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
☆10Updated 3 years ago
Alternatives and similar repositories for OSEP-Code-Snippets
Users that are interested in OSEP-Code-Snippets are comparing it to the libraries listed below
Sorting:
- C# loader capable of running stage-1 from remote url, file path as well as file share☆16Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- Powerfull scripts to bypass windows defender☆9Updated 3 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆41Updated 11 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆30Updated 3 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 2 years ago
- Custom Python shellcode encryptor and obfuscator☆12Updated last year
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆17Updated 5 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆29Updated 2 years ago
- This script make any windows compatible with RDP connection☆19Updated 3 months ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Updated 2 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆38Updated 5 months ago
- Beacon Object File implementation of Yaxser's Backstab☆15Updated 3 years ago
- Unhook DLL via cleaning the DLL 's .text section☆9Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- NanoCore rat stub source code☆38Updated 2 years ago
- Extracting Syscall Stub, Modernized☆64Updated 3 years ago
- Ransomware written in go, encrypt - decrypt.☆20Updated 2 weeks ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated last year
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- Another AMSI bypass - but in C++.☆23Updated last year
- ☆11Updated 2 years ago
- Multipurpose malware framework☆24Updated 3 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago