Zerx0r / dvenomLinks
π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.
β157Updated last year
Alternatives and similar repositories for dvenom
Users that are interested in dvenom are comparing it to the libraries listed below
Sorting:
- β220Updated last year
- β164Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ117Updated last year
- A Tool that aims to evade av with binary paddingβ154Updated last year
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ207Updated last year
- AV bypass while you sip your Chai!β222Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.β241Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructureβ140Updated last year
- Heavily obfuscated ASP web shell generation tool.β166Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.β235Updated 2 years ago
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- Repository contains psexec, which will help to exploit the forgotten pipeβ171Updated 8 months ago
- β88Updated last year
- TeamServer and Client of Exploration Command and Control Frameworkβ139Updated last month
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPEβ206Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β105Updated 3 weeks ago
- AdaptixFramework Extension Kitβ179Updated last week
- β229Updated 8 months ago
- Weaponized HellsGate/SigFlipβ199Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.β304Updated 3 years ago
- β164Updated last year
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445β53Updated last year
- ErebusGate for Nim Bypass AV/EDRβ161Updated 2 years ago
- Terminate AV/EDR leveraging BYOVD attackβ88Updated 3 months ago
- Set of python scripts which perform different ways of command execution via WMI protocol.β160Updated 2 years ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driverβ276Updated 2 months ago
- Execute shellcode files with rundll32β205Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dumpβ150Updated 9 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ54Updated last year
- Evasive Golang Loaderβ132Updated 11 months ago