Sh4rk0-666 / Baphomet
☆48Updated this week
Related projects: ⓘ
- A curated list of tools and techniques written from experience in weaponization of malware☆33Updated 10 months ago
- powershell tool for VM evasion☆43Updated 3 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- ☆22Updated this week
- Malicious Macro attack techniques for red teamers☆15Updated 3 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆33Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 2 years ago
- Disable Windows Defender All Version☆31Updated 3 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- A simple injector that uses LoadLibraryA☆15Updated 4 years ago
- ☆16Updated 3 years ago
- AMSI detection PoC☆30Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 3 years ago
- ☆11Updated 4 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 5 years ago
- ☆23Updated 4 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆19Updated 3 years ago
- ☆22Updated 2 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 3 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- A Golang implant that uses Slack as a command and control server☆45Updated 4 years ago
- miscellaneous sploit scripts/hacks☆13Updated 2 months ago
- AMSI Bypass for powershell☆29Updated 2 years ago
- My Python Cookiecutter project template☆29Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆17Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 3 years ago
- ☆22Updated 3 years ago