OmriBaso / DLLicous-MaliciousDLL
A generator for malicious DLL files for DLL Hijacking attacks
☆31Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for DLLicous-MaliciousDLL
- Penetration Test / Read Team - C# tools repository☆56Updated 2 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆34Updated last year
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated last week
- ☆16Updated 3 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆59Updated 4 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆59Updated 5 years ago
- ☆19Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- AV/EDR evasion via direct system calls.☆32Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆33Updated 3 years ago
- Malicious Macro attack techniques for red teamers☆15Updated 3 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆39Updated 4 years ago
- Suite of Shellcode Running Utilities☆106Updated 4 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆35Updated 3 years ago
- polymorphic webshells☆30Updated 7 years ago
- The Hunt for Malicious Strings☆11Updated 4 years ago
- Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61☆37Updated 7 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆84Updated 3 years ago
- ☆30Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆12Updated 2 years ago
- Iterative AD discovery toolkit for offensive operations☆86Updated 4 years ago
- Vulnerabilities, exploits, and PoCs☆34Updated 2 months ago
- Post-exploitation tool for attacking Active Directory domain controllers☆15Updated last year
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- This code was used for the blogpost on secjuice.☆40Updated 5 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆50Updated last year
- ☆51Updated 6 years ago