Nicolas-Arsenault / run-shellcode-in-memoryLinks
Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).
☆16Updated 7 months ago
Alternatives and similar repositories for run-shellcode-in-memory
Users that are interested in run-shellcode-in-memory are comparing it to the libraries listed below
Sorting:
- ☆57Updated 8 months ago
- ☆10Updated 7 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆31Updated 3 months ago
- A Moodle Scanner☆42Updated 8 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- A small red team course☆40Updated 2 years ago
- ☆35Updated last year
- Repo for all my exploits/PoCs☆51Updated 2 months ago
- ☆59Updated 9 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆21Updated last year
- Cobalt Strike BOFS☆16Updated last year
- Vast.ai Password Kracking☆76Updated last month
- vulnlab.com reaper writeup☆26Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 11 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆32Updated 3 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆23Updated 7 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆23Updated 10 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆39Updated 5 months ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 9 months ago
- Deploy a phishing infrastructure on the fly.☆71Updated 6 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- ☆22Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year