Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process
☆75May 19, 2024Updated last year
Alternatives and similar repositories for IP-Hunter
Users that are interested in IP-Hunter are comparing it to the libraries listed below
Sorting:
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆31May 23, 2025Updated 9 months ago
- A PoC .NET-specific process injection tool☆58Mar 17, 2024Updated last year
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Nov 16, 2023Updated 2 years ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Mar 9, 2024Updated last year
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆47Jun 15, 2024Updated last year
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- URLFUZZ By T00ls.Net☆24Jul 4, 2023Updated 2 years ago
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 6 months ago
- Automated .NET AppDomain hijack payload generation☆129Feb 4, 2025Updated last year
- PhantomsGate: Advanced Shellcode Injection Technique☆26Jul 15, 2024Updated last year
- GitHubApi CVE Poc监控工具☆14Jan 23, 2026Updated last month
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆281Sep 18, 2024Updated last year
- Generic PE loader for fast prototyping evasion techniques☆244Jul 2, 2024Updated last year
- Local & remote Windows DLL Proxying☆169Jun 17, 2024Updated last year
- Dynamically convert an unmanaged EXE or DLL file to PIC shellcode by prepending a shellcode stub.☆325Apr 12, 2024Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆537Nov 14, 2025Updated 3 months ago
- SharpASM is a C# project that aims to automate ASM (i.e. shellcode) execution in .NET programs by exploiting code caves in RWX sections a…☆59May 23, 2022Updated 3 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Aug 15, 2024Updated last year
- A technique of hiding malicious shellcode via Shannon encoding.☆263Oct 23, 2022Updated 3 years ago
- Research into WinSxS binaries and finding hijackable paths☆30Dec 7, 2025Updated 2 months ago
- XOR decrypting shellcode using the GPU with OpenCL.☆120May 22, 2025Updated 9 months ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆307Dec 9, 2023Updated 2 years ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118May 2, 2024Updated last year
- ☆14Sep 22, 2019Updated 6 years ago
- Source generator to add D/Invoke and indirect syscall methods to a C# project.☆190Mar 4, 2024Updated last year
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- AV bypass while you sip your Chai!☆224May 17, 2024Updated last year
- ☆19Nov 28, 2024Updated last year
- Library of BOFs to interact with SQL servers☆223Dec 3, 2025Updated 2 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆160Jul 14, 2025Updated 7 months ago
- Hijacks code execution via overwriting Control Flow Guard pointers in combase.dll☆136Apr 18, 2025Updated 10 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆211Jun 10, 2024Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆224Apr 18, 2025Updated 10 months ago