Tylous / ZipExec
A unique technique to execute binaries from a password protected zip
☆1,015Updated 2 years ago
Alternatives and similar repositories for ZipExec:
Users that are interested in ZipExec are comparing it to the libraries listed below
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆742Updated last year
- EXOCET - AV-evading, undetectable, payload delivery tool☆837Updated 2 years ago
- Syscall Shellcode Loader (Work in Progress)☆1,157Updated 9 months ago
- A small POC to make defender useless by removing its token privileges and lowering the token integrity☆677Updated 2 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆952Updated 2 years ago
- ☆506Updated 3 years ago
- NTLM relaying for Windows made easy☆555Updated last year
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,063Updated 10 months ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,063Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆897Updated 8 months ago
- .NET, PE, & Raw Shellcode Packer/Loader Written in Nim☆766Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,179Updated last year
- Self-developed tools for Lateral Movement/Code Execution☆702Updated 3 years ago
- PowerShell Script Obfuscator☆513Updated last year
- Nim-based assembly packer and shellcode loader for opsec & profit☆461Updated last year
- Convert shellcode into different formats!☆347Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆829Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,183Updated last year
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆511Updated 2 weeks ago
- Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)☆781Updated 3 years ago
- It's a go variant of Hells gate! (directly calling windows kernel functions, but from Go!)☆494Updated 2 years ago
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆988Updated 3 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆274Updated 3 years ago
- Various Cobalt Strike BOFs☆612Updated 2 years ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆383Updated 2 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,289Updated last year
- Various ways to execute shellcode☆482Updated 11 months ago
- A C2 post-exploitation framework☆467Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆553Updated 3 years ago
- ☆469Updated 3 months ago