Tylous / IvyLinks
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment to load, decrypt and execute shellcode.
☆24Updated 2 years ago
Alternatives and similar repositories for Ivy
Users that are interested in Ivy are comparing it to the libraries listed below
Sorting:
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆88Updated 2 years ago
- ☆60Updated last year
- Sniffing files generator☆59Updated 8 months ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- ☆47Updated 2 years ago
- ☆37Updated 7 months ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Updated 2 years ago
- Bunch of BOF files☆35Updated 4 months ago
- Rewrite to fit my needs☆31Updated last year
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆67Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆75Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Updated 3 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆29Updated 5 months ago
- Click Once + App Domain☆64Updated last year
- Python module for running BOFs☆74Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- Scripts to interact with Microsoft Graph APIs☆43Updated 11 months ago
- A care package of useful bofs for red team engagments☆55Updated 10 months ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆24Updated 2 years ago
- ☆34Updated 8 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆43Updated last year
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆21Updated 2 years ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆84Updated 4 months ago
- All my POC related to malware development☆14Updated last year
- ☆58Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- SAM Dumping in C#☆54Updated 9 months ago