SaadAhla / DocPlzLinks
Documents Exfiltration project for fun and educational purposes
β145Updated last year
Alternatives and similar repositories for DocPlz
Users that are interested in DocPlz are comparing it to the libraries listed below
Sorting:
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β157Updated last year
- Terminate AV/EDR leveraging BYOVD attackβ87Updated 3 months ago
- Evasive Golang Loaderβ131Updated 10 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ71Updated last year
- AV bypass while you sip your Chai!β221Updated last year
- C or BOF file to extract WebKit master key to decrypt user cookieβ199Updated last year
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teamsβ132Updated last year
- Dump Windows SAM hashesβ42Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proceβ¦β131Updated 7 months ago
- β164Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)β83Updated last year
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the cloneβ¦β201Updated 8 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ206Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β98Updated this week
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β152Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructureβ140Updated last year
- γπγProof of concept on BYOVD attackβ161Updated 6 months ago
- reflectively load and execute PEs locally and remotely bypassing EDR hooksβ155Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replicationβ111Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ147Updated last year
- Execute shellcode files with rundll32β203Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's sectionβ148Updated last year
- Havoc C2 profile generatorβ90Updated 8 months ago
- Different methods to get current username without using whoamiβ177Updated last year
- β220Updated last year
- Lateral Movementβ124Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.β103Updated last year
- ApexLdr is a DLL Payload Loader written in Cβ110Updated 11 months ago
- β136Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reductiβ¦β201Updated last year