NetSPI / silkwasm
HTML Smuggling with Web Assembly
☆60Updated last year
Alternatives and similar repositories for silkwasm:
Users that are interested in silkwasm are comparing it to the libraries listed below
- ☆50Updated 6 months ago
- BOF to decrypt Signal Desktop chat logs☆65Updated 2 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆19Updated 2 months ago
- Tool designed to simplify the generation of proxy DLLs while addressing common conflicts related to windows.h☆37Updated 7 months ago
- ☆48Updated last year
- Nemesis agent for Mythic☆27Updated 8 months ago
- BOF for C2 framework☆41Updated 6 months ago
- Tool to aid in dumping LSASS process remotely☆38Updated 9 months ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆17Updated 9 months ago
- ☆71Updated last year
- ☆24Updated 2 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆45Updated 4 months ago
- ☆40Updated this week
- ☆88Updated 2 years ago
- ☆41Updated 10 months ago
- ☆59Updated last year
- A VSCode devcontainer for development of COFF files with batteries included.☆49Updated last year
- ☆28Updated 11 months ago
- Lateral Movement via the .NET Profiler☆81Updated 5 months ago
- macOS dylib stager☆32Updated 3 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 9 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- A simple POC to expose Mythic as a MCP server☆60Updated last month
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆81Updated 2 years ago
- Linux CS bypass technique☆33Updated 3 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆32Updated 2 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆70Updated last year
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 6 months ago
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago