Tylous / IvyLinks
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment to load, decrypt and execute shellcode.
☆23Updated 2 years ago
Alternatives and similar repositories for Ivy
Users that are interested in Ivy are comparing it to the libraries listed below
Sorting:
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆86Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆22Updated 3 years ago
- Python module for running BOFs☆72Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆21Updated 2 years ago
- ☆60Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Updated 2 years ago
- Sniffing files generator☆59Updated 7 months ago
- C# Based Universal API Unhooker - Automatically Unhook API Hives (ntdll.dll,kernel32.dll,user32.dll,and kernelbase.dll)☆24Updated 2 years ago
- ☆47Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- A care package of useful bofs for red team engagments☆55Updated 10 months ago
- Click Once + App Domain☆63Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆65Updated last year
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆32Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 6 months ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆24Updated 2 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆28Updated 4 months ago
- HTML smuggling is not an evil, it can be useful☆13Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆56Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- Rewrite to fit my needs☆31Updated last year
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 5 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 2 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Updated 2 years ago
- ☆34Updated 7 months ago