Zerx0r / dvenom
🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.
☆158Updated last year
Related projects ⓘ
Alternatives and complementary repositories for dvenom
- ☆212Updated 7 months ago
- A Tool that aims to evade av with binary padding☆135Updated 4 months ago
- Execute shellcode files with rundll32☆181Updated 9 months ago
- ☆163Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆111Updated 9 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆199Updated 11 months ago
- Documents Exfiltration project for fun and educational purposes☆143Updated last year
- Heavily obfuscated ASP web shell generation tool.☆161Updated 6 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆52Updated 9 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆130Updated last year
- AV bypass while you sip your Chai!☆206Updated 5 months ago
- Evasive Golang Loader☆130Updated 3 months ago
- Shaco is a linux agent for havoc☆145Updated last year
- Set of python scripts which perform different ways of command execution via WMI protocol.☆158Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆146Updated 6 months ago
- Reverse shell that can bypass windows defender detection☆151Updated 9 months ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆241Updated 4 months ago
- Terminate AV/EDR leveraging BYOVD attack☆77Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆364Updated 4 months ago
- micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.☆152Updated 3 months ago
- Leverage WindowsApp createdump tool to obtain an lsass dump☆141Updated last month
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆227Updated 4 months ago
- Terminate AV/EDR Processes using kernel driver☆336Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.☆224Updated last year
- ☆156Updated last year
- Different methods to get current username without using whoami☆172Updated 8 months ago
- A C# port from Invoke-GhostTask☆109Updated 10 months ago