YJesus / RCLocals
Linux startup analyzer
☆64Updated 3 years ago
Alternatives and similar repositories for RCLocals:
Users that are interested in RCLocals are comparing it to the libraries listed below
- Harvis is designed to automate your C2 Infrastructure.☆105Updated 2 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆91Updated 3 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆48Updated 4 years ago
- Lazarus analysis tools and research report☆56Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- Dumping credentials through windbg and pykd☆40Updated last year
- PyQT5 app for LOLBAS and GTFOBins☆46Updated 2 years ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆80Updated 2 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆66Updated last year
- Windows internals and exploitation tricks☆93Updated 4 months ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Simple rapper for Mimikatz, bypass Defender☆140Updated 3 years ago
- (kinda) Malicious Outlook Reader☆134Updated 4 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆52Updated 3 years ago
- Simple tool to perform HTML Smuggling.☆67Updated 3 years ago
- ☆63Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 3 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆42Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆99Updated 3 years ago
- A swiss army knife for pentesting networks☆25Updated 2 years ago
- ☆35Updated 4 years ago
- Ingest openldap data into bloodhound☆78Updated 4 years ago
- Discord as a C2☆49Updated 4 years ago
- Smart Card PIN swiping DLL☆77Updated 4 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 2 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆69Updated 2 weeks ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆102Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago