YJesus / RCLocals
Linux startup analyzer
☆60Updated 2 years ago
Alternatives and similar repositories for RCLocals:
Users that are interested in RCLocals are comparing it to the libraries listed below
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆42Updated 3 years ago
- Smart Card PIN swiping DLL☆77Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆98Updated 3 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- ☆38Updated 2 years ago
- Harvis is designed to automate your C2 Infrastructure.☆105Updated 2 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆69Updated 5 months ago
- Dumping credentials through windbg and pykd☆40Updated last year
- This program will take encrypted shell code and decrypt it in run time and inject it into another process☆29Updated 2 years ago
- ☆19Updated last year
- Dell Driver EoP (CVE-2021-21551)☆32Updated 2 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆79Updated last year
- ☆35Updated 4 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆51Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- Exfiltrate data from a compromised target using covert channels☆15Updated 3 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆58Updated last year
- ☆42Updated 2 years ago
- Lazarus analysis tools and research report☆55Updated last year
- PickleC2 is a post-exploitation and lateral movements framework☆89Updated 3 years ago
- Windows internals and exploitation tricks☆92Updated 2 months ago
- 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)☆80Updated 2 years ago
- all credits go to @mgeeky☆59Updated 3 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆87Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆61Updated 2 years ago
- PoC-Malware-TTPs☆49Updated last year