☆71Dec 9, 2022Updated 3 years ago
Alternatives and similar repositories for aikido_wiper
Users that are interested in aikido_wiper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆108Apr 18, 2024Updated 2 years ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆20Jun 20, 2024Updated last year
- ☆11May 27, 2021Updated 4 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Nov 9, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆674Dec 23, 2022Updated 3 years ago
- Just another ntdll unhooking using Parun's Fart technique☆76Feb 15, 2023Updated 3 years ago
- Do some DLL SideLoading magic☆92Sep 20, 2023Updated 2 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆503Jan 10, 2023Updated 3 years ago
- ☆185Jul 2, 2022Updated 3 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- ☆81Apr 23, 2024Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆153May 3, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- MiniDumpWriteDump behavior modification hook☆50Feb 15, 2021Updated 5 years ago
- ☆57Apr 19, 2023Updated 3 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 4 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆18Dec 12, 2023Updated 2 years ago
- ☆16Mar 26, 2024Updated 2 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- Exploit for CVE-2022-27226☆15Mar 19, 2022Updated 4 years ago
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆90Oct 10, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆25Apr 28, 2024Updated 2 years ago
- PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication☆36Jul 5, 2022Updated 3 years ago
- ☆138Aug 2, 2022Updated 3 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆91Dec 15, 2022Updated 3 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 3 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- ☆17Jun 28, 2023Updated 2 years ago
- Terminate AV/EDR leveraging BYOVD attack☆103Mar 21, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆48Feb 11, 2023Updated 3 years ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆122Jul 2, 2024Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) for kernel exploitation using AMD's Ryzen Master Driver (version 17).☆157Jan 21, 2023Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago