☆13May 27, 2020Updated 5 years ago
Alternatives and similar repositories for Excel-4.0-Shellcode-Generator
Users that are interested in Excel-4.0-Shellcode-Generator are comparing it to the libraries listed below
Sorting:
- Simple PoCs for utilizing Windows syscalls in Go☆16Jan 13, 2021Updated 5 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- YonyouNC RCE☆13Dec 2, 2020Updated 5 years ago
- Search for potential emails from your target in Github's public events☆16May 31, 2021Updated 4 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Windows 权限提升 BadPotato☆14Jun 12, 2021Updated 4 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- 安服面经☞渗透测试/代码审计/安全研究☆28May 3, 2022Updated 3 years ago
- 用bat脚本在windows环境下,一键免杀shellcode☆28Mar 6, 2022Updated 4 years ago
- burp插件:python版,token防重放绕过☆19Jan 16, 2021Updated 5 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- An open-source .NET remake of the NES version of Solomon's Key with new features, new levels, and an integrated level editor☆22Aug 18, 2021Updated 4 years ago
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- 通达oa下载 http://www.tongda2000.com/download/2019.php☆15Mar 18, 2020Updated 6 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- This repository provides the core to build your own External C2 Server and Connector for Brute Ratel C4☆55May 8, 2022Updated 3 years ago
- A PHP wrapper template to execute PowerShell payloads☆11Apr 2, 2021Updated 4 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆14Mar 4, 2019Updated 7 years ago
- ☆18Jan 12, 2026Updated 2 months ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆16Oct 10, 2016Updated 9 years ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Log4j_dos_CVE-2021-45105☆13Dec 19, 2021Updated 4 years ago
- Apache-backdoor Apache 中间件模块后门☆53Jan 10, 2020Updated 6 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated 11 months ago
- Gets the name of all currently running process then checks them against a list of known defensive products such as AV's, EDR's and loggin…☆14Oct 8, 2022Updated 3 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Documentation and Support for AttackForge ReportGen☆20Jul 26, 2025Updated 7 months ago
- ☆11Feb 19, 2024Updated 2 years ago
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆13Dec 14, 2023Updated 2 years ago
- 《Windows提权方法论》☆46May 31, 2023Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆30Jun 7, 2023Updated 2 years ago
- ☆28Apr 4, 2022Updated 3 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- ☆78Aug 1, 2023Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆124Apr 9, 2022Updated 3 years ago
- A shellcode tool to make convenient shellcode programing work flow.☆12Oct 19, 2021Updated 4 years ago