TunnelGRE / XOR_NIM_Inject
Simple shellcode injection in Nim encrypted in XOR
☆20Updated last year
Related projects: ⓘ
- Beacon Object Files.☆31Updated 6 months ago
- Tool to start processes as SYSTEM using token duplication☆37Updated 3 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆61Updated 2 years ago
- old postex for grabbing a krbtgs for my current user☆28Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆78Updated last year
- A spin-off research project. Cobalt Strike x Notion collab 2022☆53Updated 2 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆15Updated 5 months ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆47Updated 3 years ago
- ☆42Updated this week
- ☆22Updated this week
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆58Updated 2 years ago
- ☆50Updated 2 years ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆37Updated 9 months ago
- ☆26Updated this week
- A simple BOF implementation of klist using Windows API☆30Updated 2 years ago
- ProcExp Driver (Ab)use☆20Updated last year
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆19Updated 3 months ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆26Updated last year
- ☆30Updated this week
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆48Updated 2 years ago
- Winsocket for Cobalt Strike.☆96Updated last year
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Updated 9 months ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- ☆56Updated 7 months ago
- Active Directory certificate abuse.☆36Updated 2 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆17Updated 8 months ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆47Updated 3 years ago
- Use CMSTP.exe to bypass UAC.☆36Updated 2 years ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆36Updated last year
- ☆16Updated this week