NYAN-x-CAT / OSEP-Code-SnippetsLinks
A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
☆10Updated 4 years ago
Alternatives and similar repositories for OSEP-Code-Snippets
Users that are interested in OSEP-Code-Snippets are comparing it to the libraries listed below
Sorting:
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆32Updated 4 years ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆15Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- Extracting Syscall Stub, Modernized☆66Updated 3 years ago
- Injecting shellcode into a process memory and executing it in C#☆52Updated 3 years ago
- NanoCore rat stub source code☆39Updated 3 years ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆62Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- Another AMSI bypass - but in C++.☆24Updated 2 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Updated 3 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Updated 2 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Updated 3 years ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆44Updated last year
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆31Updated 3 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 2 years ago
- Test antiviruses☆12Updated 2 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆33Updated 4 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Updated 3 years ago
- This script make any windows compatible with RDP connection☆21Updated 4 months ago
- PDF Icon File Type Spoofer☆17Updated last year
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago