S3N4T0R-0X0 / AM0N-Eye
☆28Updated this week
Related projects: ⓘ
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆102Updated last year
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆37Updated 4 months ago
- ☆76Updated last year
- Winsocket for Cobalt Strike.☆96Updated last year
- ☆92Updated last year
- ☆86Updated 8 months ago
- ApexLdr is a DLL Payload Loader written in C☆98Updated 2 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆51Updated 7 months ago
- Lateral Movement☆117Updated 10 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆147Updated 10 months ago
- Dump Windows SAM hashes☆40Updated last year
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆196Updated last year
- ☆22Updated this week
- CVE-2023-20198 Exploit PoC☆37Updated 9 months ago
- ☆201Updated 4 months ago
- ☆65Updated this week
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆42Updated 2 years ago
- Create Anti-Copy DRM Malware☆36Updated last month
- To audit the security of read-only domain controllers☆112Updated 9 months ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆74Updated 2 years ago
- ☆40Updated 2 years ago
- Terminate AV/EDR leveraging BYOVD attack☆77Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆74Updated last year
- Repository contains psexec, which will help to exploit the forgotten pipe☆160Updated last year
- Proof of Concept for Authentication Bypass in JetBrains TeamCity Pre-2023.11.4☆30Updated 6 months ago
- Exploit for the CVE-2024-5806☆40Updated 2 months ago
- ☆53Updated 5 months ago
- Execute commands in other Sessions☆74Updated last month
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆65Updated last year