Mapping of Binaries that allows Arbitrary Code Execution
☆26May 10, 2018Updated 7 years ago
Alternatives and similar repositories for BACE
Users that are interested in BACE are comparing it to the libraries listed below
Sorting:
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- CVE-2024-53691☆14Jan 13, 2025Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- automated sticky keys backdoor☆10Feb 12, 2016Updated 10 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Telco training☆26Oct 17, 2018Updated 7 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 6 years ago
- A repository where I share my injection implemintations☆29Jul 26, 2020Updated 5 years ago
- Post module for Metasploit to execute ELF in memory☆86Nov 23, 2018Updated 7 years ago
- ☆12Feb 6, 2025Updated last year
- A fork of openssh-portable for penetration testing purposes.☆11May 18, 2018Updated 7 years ago
- ☆16Dec 5, 2023Updated 2 years ago
- The Alternative Fileless File System☆57Apr 4, 2019Updated 6 years ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- Detecting PowerShell Empire, Metasploit Meterpreter and Cobalt Strike agents by payload size sequence analysis and host correlation☆15Aug 17, 2018Updated 7 years ago
- ☆58Jul 16, 2017Updated 8 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Sep 13, 2019Updated 6 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated last month
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Aug 24, 2019Updated 6 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Sep 14, 2017Updated 8 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆73Feb 28, 2020Updated 6 years ago
- Transform any javascript code to an equivalent sequence of ()[]{}!☆20Jul 12, 2022Updated 3 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Windows Stagers to circumvent restrictive network environments☆69Sep 23, 2024Updated last year
- PowerView menu for Cobalt Strike☆70Mar 22, 2018Updated 7 years ago
- ☆229May 10, 2018Updated 7 years ago
- ☆19Sep 15, 2021Updated 4 years ago
- An AFL scaling benchmarking tool☆18May 29, 2020Updated 5 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago