YJesus / RCLocals
Linux startup analyzer
☆65Updated 3 years ago
Alternatives and similar repositories for RCLocals:
Users that are interested in RCLocals are comparing it to the libraries listed below
- A Golang implant that uses Slack as a command and control server☆46Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆107Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆48Updated 4 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆43Updated 3 years ago
- Lazarus analysis tools and research report☆56Updated last year
- PickleC2 is a post-exploitation and lateral movements framework☆91Updated 3 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆66Updated last year
- A Visual Studio Code Extension agent for Mythic C2☆70Updated 5 months ago
- A repo to house files for our blogposts on blog.nviso.eu☆70Updated last month
- This program will take encrypted shell code and decrypt it in run time and inject it into another process☆29Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆100Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆46Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 2 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆72Updated 4 years ago
- Password Spraying Framework☆63Updated 2 years ago
- ☆35Updated 4 years ago
- Unpacking and decryption tools for the Emotet malware☆46Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆46Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 3 years ago
- pypykatz plugin for volatility3 framework☆40Updated last year
- Windows internals and exploitation tricks☆94Updated 5 months ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆37Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago