Zerx0r / dvenom
π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.
β158Updated last year
Alternatives and similar repositories for dvenom:
Users that are interested in dvenom are comparing it to the libraries listed below
- β214Updated 11 months ago
- β162Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ199Updated last year
- A Tool that aims to evade av with binary paddingβ146Updated 8 months ago
- TeamServer and Client of Exploration Command and Control Frameworkβ105Updated last week
- An aggressor script that can help automate payload building in Cobalt Strikeβ114Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.β236Updated 8 months ago
- Heavily obfuscated ASP web shell generation tool.β163Updated 10 months ago
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- Terminate AV/EDR leveraging BYOVD attackβ80Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ53Updated last year
- Terminate AV/EDR Processes using kernel driverβ339Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β150Updated 9 months ago
- AV bypass while you sip your Chai!β218Updated 9 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dumpβ145Updated 5 months ago
- Evasive Golang Loaderβ129Updated 7 months ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPEβ205Updated last year
- Abuse leaked token handles.β131Updated last year
- β221Updated 9 months ago
- Execute shellcode from a remote-hosted bin file using Winhttp.β230Updated last year
- Execute shellcode files with rundll32β190Updated last year
- Automated .NET AppDomain hijack payload generationβ120Updated 3 weeks ago
- A C# port from Invoke-GhostTaskβ112Updated last year
- A shellcode injection tool showcasing various process injection techniquesβ134Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructureβ135Updated last year
- C or BOF file to extract WebKit master key to decrypt user cookieβ188Updated 10 months ago
- Shaco is a linux agent for havocβ156Updated last year
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driverβ259Updated 3 weeks ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.β209Updated last year
- A Rust implementation of GodPotato β abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTAβ¦β224Updated last month