Zerx0r / dvenomLinks
π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.
β158Updated 2 years ago
Alternatives and similar repositories for dvenom
Users that are interested in dvenom are comparing it to the libraries listed below
Sorting:
- β219Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ118Updated last year
- β165Updated 2 years ago
- A Tool that aims to evade av with binary paddingβ156Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ225Updated last year
- Heavily obfuscated ASP web shell generation tool.β172Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.β248Updated last year
- TeamServer and Client of Exploration Command and Control Frameworkβ175Updated last week
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures β¦β38Updated last month
- AV bypass while you sip your Chai!β223Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructureβ142Updated 2 years ago
- Execute shellcode files with rundll32β209Updated last year
- β89Updated last year
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445β53Updated last year
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCEβ196Updated last year
- Documents Exfiltration project for fun and educational purposesβ144Updated 2 years ago
- Chrome browser extension-based Command & Controlβ196Updated 4 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.β238Updated 2 years ago
- β152Updated 2 years ago
- β157Updated last year
- β232Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β118Updated 4 months ago
- PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) β weaponized to kill protected EDR/AV processes via BYOVD.β172Updated 2 months ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIsβ¦β161Updated last year
- Set of python scripts which perform different ways of command execution via WMI protocol.β163Updated 2 years ago
- yet another AV killer tool using BYOVDβ297Updated last year
- β163Updated 2 years ago
- β100Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.β312Updated 3 years ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll fileβ36Updated 2 years ago