☆29Sep 4, 2024Updated last year
Alternatives and similar repositories for sh4loader
Users that are interested in sh4loader are comparing it to the libraries listed below
Sorting:
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Jul 3, 2025Updated 8 months ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- ☆38Jan 7, 2025Updated last year
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 10 months ago
- ☆22Jun 9, 2025Updated 8 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆147Jul 17, 2025Updated 7 months ago
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Cortex EDR Ransomware protection Bypass☆26Feb 8, 2025Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆45Nov 29, 2024Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- ☆14Jun 27, 2024Updated last year
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 5 months ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 11 months ago
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- rcat☆74Mar 7, 2022Updated 3 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Feb 28, 2025Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- My little precious collection of Linux 4.x kernel rootkits☆28Jul 27, 2024Updated last year
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆89Jun 13, 2024Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆283Jun 15, 2024Updated last year
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆175Dec 19, 2025Updated 2 months ago
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 11 months ago
- ☆14Mar 19, 2024Updated last year
- ☆26Mar 11, 2025Updated 11 months ago
- ☆41Feb 20, 2025Updated last year
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆16Jul 15, 2025Updated 7 months ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated 11 months ago
- winPEAS, but for Active Directory☆173Apr 1, 2025Updated 11 months ago