SafeBreach-Labs / QuickShellLinks
A library and a set of tools for exploiting and communicating with Google's Quick Share devices.
☆47Updated 10 months ago
Alternatives and similar repositories for QuickShell
Users that are interested in QuickShell are comparing it to the libraries listed below
Sorting:
- ☆63Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆36Updated last year
- POC of GITHUB simple C2 in rust☆52Updated 6 months ago
- Malware Analysis tools☆26Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 11 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆89Updated 2 months ago
- Vibe Malware Triage - MCP server for static PE analysis.☆74Updated 2 months ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆107Updated last year
- ☆64Updated 2 years ago
- ☆49Updated 2 years ago
- ☆39Updated last year
- ☆38Updated 2 years ago
- ☆27Updated last year
- Retrieve inner payloads from Donut samples☆117Updated 2 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 11 months ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆91Updated 6 months ago
- Java archive implant toolkit.☆61Updated 9 months ago
- ☆31Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- CVE-2024-30090 - LPE PoC☆108Updated last year
- Quick test for CVE-2023-26025 behaviours☆13Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- ysoserial.net docker image☆28Updated last year
- Tools for offensive security of NetBackup infrastructures☆43Updated 2 years ago
- Source code and examples for PassiveAggression☆64Updated last year
- ☆105Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Updated 3 years ago
- Analyse MSI files for vulnerabilities☆143Updated last year
- Make an Linux Kernel rootkit visible again.☆59Updated 11 months ago