Zerx0r / dvenomLinks
π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.
β158Updated last year
Alternatives and similar repositories for dvenom
Users that are interested in dvenom are comparing it to the libraries listed below
Sorting:
- β220Updated last year
- β166Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ118Updated last year
- A Tool that aims to evade av with binary paddingβ154Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.β244Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ224Updated last year
- AV bypass while you sip your Chai!β224Updated last year
- Heavily obfuscated ASP web shell generation tool.β167Updated last year
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445β53Updated last year
- Execute shellcode files with rundll32β207Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.β235Updated 2 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructureβ140Updated 2 years ago
- β89Updated last year
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β105Updated last month
- β150Updated 2 years ago
- AdaptixFramework Extension Kitβ199Updated last week
- TeamServer and Client of Exploration Command and Control Frameworkβ143Updated this week
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driverβ281Updated 3 months ago
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures β¦β35Updated last month
- β158Updated last year
- Awesome AV/EDR/XDR Bypass Tipsβ276Updated 2 years ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCEβ196Updated 8 months ago
- Terminate AV/EDR leveraging BYOVD attackβ89Updated 4 months ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIsβ¦β157Updated last year
- β230Updated 8 months ago
- Homemade Aggressor scripts kit for Cobalt Strikeβ71Updated this week
- Set of python scripts which perform different ways of command execution via WMI protocol.β160Updated 2 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPEβ206Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ54Updated last year