Zerx0r / dvenomLinks
π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.
β158Updated 2 years ago
Alternatives and similar repositories for dvenom
Users that are interested in dvenom are comparing it to the libraries listed below
Sorting:
- β220Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ118Updated last year
- β166Updated last year
- A Tool that aims to evade av with binary paddingβ154Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ225Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.β246Updated last year
- Heavily obfuscated ASP web shell generation tool.β170Updated last year
- AV bypass while you sip your Chai!β224Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.β235Updated 2 years ago
- Execute shellcode files with rundll32β208Updated last year
- TeamServer and Client of Exploration Command and Control Frameworkβ157Updated 2 weeks ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β107Updated 2 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructureβ141Updated 2 years ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445β54Updated last year
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- β89Updated last year
- Terminate AV/EDR Processes using kernel driverβ349Updated 2 years ago
- β232Updated 10 months ago
- yet another AV killer tool using BYOVDβ297Updated last year
- AdaptixFramework Extension Kitβ229Updated last week
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driverβ289Updated 4 months ago
- Exploit for the CVE-2023-23397β161Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipeβ171Updated 10 months ago
- β164Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dumpβ149Updated 11 months ago
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...β159Updated last year
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures β¦β36Updated 2 months ago
- Smart keylogging capability to steal SSH Credentials including password & Private Keyβ138Updated 5 months ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPEβ206Updated 2 years ago
- Set of python scripts which perform different ways of command execution via WMI protocol.β162Updated 2 years ago