A "tiny" meterpreter stager
☆128Aug 20, 2019Updated 6 years ago
Alternatives and similar repositories for TinyMet
Users that are interested in TinyMet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆17Oct 5, 2014Updated 11 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Lists work items being queued currently.☆15Jun 7, 2015Updated 10 years ago
- Simple but effective word list transmutation command-line app. Feed it words, and mangle them into new variations quickly and easily!☆33May 5, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- C++ Code Injector Class☆22Oct 2, 2020Updated 5 years ago
- Dll Convert to Shellcode.☆41Jul 4, 2022Updated 3 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Metasploit AV Evasion Tool☆256Dec 22, 2015Updated 10 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆176Jul 21, 2020Updated 5 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆367Dec 14, 2014Updated 11 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- ☆65May 26, 2016Updated 9 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago
- Extend WSH functionality with Registration-Free COM☆26Feb 23, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆12Feb 19, 2017Updated 9 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- Guides for locking down a computer☆12Mar 4, 2023Updated 3 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago