Tylous / IvyLinks
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment to load, decrypt and execute shellcode.
☆24Updated 2 years ago
Alternatives and similar repositories for Ivy
Users that are interested in Ivy are comparing it to the libraries listed below
Sorting:
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆88Updated 3 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆23Updated 3 years ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆22Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆77Updated 2 years ago
- Small project to facilitate creation of .lnk payloads☆75Updated 3 years ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆67Updated 2 years ago
- ☆61Updated 2 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆30Updated 7 months ago
- C# havoc implant☆101Updated 2 years ago
- ☆22Updated 6 months ago
- Bunch of BOF files☆37Updated 6 months ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆58Updated 3 years ago
- Python module for running BOFs☆79Updated last month
- Sniffing files generator☆59Updated 10 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated last year
- ☆39Updated 3 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Updated 3 years ago
- Run Cobalt Strike BOFs in Brute Ratel C4!☆86Updated 8 months ago
- ☆38Updated 9 months ago
- ☆80Updated 2 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Updated 3 years ago
- ☆47Updated 2 years ago
- ☆51Updated 5 months ago
- ☆38Updated 10 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 3 years ago
- A care package of useful bofs for red team engagments☆55Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year