Nicolas-Arsenault / run-shellcode-in-memory
Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).
☆16Updated 4 months ago
Alternatives and similar repositories for run-shellcode-in-memory:
Users that are interested in run-shellcode-in-memory are comparing it to the libraries listed below
- A Moodle Scanner☆40Updated 5 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- A small red team course☆37Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆29Updated 3 weeks ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 7 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 6 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Cobalt Strike BOFS☆16Updated last year
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 8 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 5 months ago
- ☆10Updated 4 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆17Updated last year
- ☆55Updated 5 months ago
- ☆14Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- ☆25Updated last year
- Template Nuclei SSTI☆29Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆20Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- ☆27Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 8 months ago
- Dumping LSASS Evaded Endpoint Security Solutions☆12Updated 2 months ago
- MacroExploit use in excel sheet☆20Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year