Zerx0r / dvenomLinks
π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.
β158Updated 2 years ago
Alternatives and similar repositories for dvenom
Users that are interested in dvenom are comparing it to the libraries listed below
Sorting:
- β220Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ118Updated last year
- β166Updated 2 years ago
- A Tool that aims to evade av with binary paddingβ156Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.β248Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ224Updated 2 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructureβ143Updated 2 years ago
- AV bypass while you sip your Chai!β224Updated last year
- Heavily obfuscated ASP web shell generation tool.β172Updated last year
- TeamServer and Client of Exploration Command and Control Frameworkβ176Updated last month
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445β53Updated last year
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures β¦β45Updated 2 months ago
- Documents Exfiltration project for fun and educational purposesβ144Updated 2 years ago
- β90Updated last year
- Chrome browser extension-based Command & Controlβ220Updated 5 months ago
- Execute shellcode files with rundll32β211Updated last year
- PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) β weaponized to kill protected EDR/AV processes via BYOVD.β175Updated 2 months ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPEβ205Updated 2 years ago
- Homemade Aggressor scripts kit for Cobalt Strikeβ88Updated last week
- Leverage WindowsApp createdump tool to obtain an lsass dumpβ151Updated last year
- Smart keylogging capability to steal SSH Credentials including password & Private Keyβ147Updated 8 months ago
- ErebusGate for Nim Bypass AV/EDRβ164Updated 3 years ago
- Repository contains psexec, which will help to exploit the forgotten pipeβ171Updated last year
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIsβ¦β161Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.β239Updated 2 years ago
- β163Updated 2 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerabilityβ42Updated 3 years ago
- Set of python scripts which perform different ways of command execution via WMI protocol.β163Updated 2 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β154Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β119Updated 5 months ago