S12cybersecurity / bypass_magic_bytes
Bypassing File Upload Restriction using Magic Bytes
☆14Updated 2 years ago
Alternatives and similar repositories for bypass_magic_bytes:
Users that are interested in bypass_magic_bytes are comparing it to the libraries listed below
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 10 months ago
- Automate All Pivoting System Enumeration with this Bash Script☆12Updated 2 years ago
- A very simple python script to encode and decode PowerShell one-liners.☆24Updated 3 years ago
- Automate Blind SQL Injection with Python.☆21Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- ☆14Updated last year
- Windows priviledge escalation script☆13Updated last month
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated 10 months ago
- ☆24Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Pentesting Tools to Automatize Active Directory Hacking☆18Updated 2 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- An offensive security framework for writing payloads☆15Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 6 months ago
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆17Updated last year
- Simple Python Modular Script to Broke Web Logins☆12Updated 2 years ago
- Undetectable payload for Windows 10 and 11☆39Updated 2 years ago
- Breaking Active Directory Security with 🍞☆31Updated 4 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆11Updated 11 months ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆16Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆16Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 7 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆14Updated 10 months ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆17Updated 3 months ago