Nicolas-Arsenault / run-shellcode-in-memoryLinks
Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).
☆16Updated 2 months ago
Alternatives and similar repositories for run-shellcode-in-memory
Users that are interested in run-shellcode-in-memory are comparing it to the libraries listed below
Sorting:
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆59Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated 2 weeks ago
- Repo for all my exploits/PoCs☆53Updated 6 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- A small red team course☆40Updated 2 years ago
- vulnlab.com reaper writeup☆27Updated 2 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- A Moodle Scanner☆43Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆48Updated 10 months ago
- ☆62Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- Vast.ai Password Kracking☆89Updated last month
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆20Updated 5 months ago
- ☆99Updated 9 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated 2 years ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Updated last year
- ☆45Updated last month
- ☆23Updated last year
- List of some AD tools I frequently use☆51Updated 3 weeks ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Deploy a phishing infrastructure on the fly.☆78Updated 11 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆22Updated 7 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆38Updated 7 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- ☆48Updated 5 months ago