Zerx0r / dvenomLinks
π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.
β157Updated last year
Alternatives and similar repositories for dvenom
Users that are interested in dvenom are comparing it to the libraries listed below
Sorting:
- β220Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ117Updated last year
- β164Updated last year
- A Tool that aims to evade av with binary paddingβ152Updated 11 months ago
- Terminate AV/EDR leveraging BYOVD attackβ87Updated 3 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ206Updated last year
- AV bypass while you sip your Chai!β221Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.β241Updated last year
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- Github as C2 Demonstration , free API = free C2 Infrastructureβ140Updated last year
- Heavily obfuscated ASP web shell generation tool.β164Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ54Updated last year
- Execute shellcode files with rundll32β203Updated last year
- Evasive Golang Loaderβ131Updated 10 months ago
- β164Updated last year
- β88Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β98Updated this week
- AdaptixFramework Extension Kitβ150Updated 3 weeks ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replicationβ111Updated 2 years ago
- Abuse leaked token handles.β132Updated last year
- Execute shellcode from a remote-hosted bin file using Winhttp.β234Updated 2 years ago
- Reverse shell that can bypass windows defender detectionβ166Updated last year
- TeamServer and Client of Exploration Command and Control Frameworkβ131Updated 3 weeks ago
- β228Updated 7 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β153Updated last year
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driverβ276Updated 2 months ago
- Havoc C2 profile generatorβ90Updated 8 months ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPEβ206Updated last year
- β99Updated last year
- Leverage WindowsApp createdump tool to obtain an lsass dumpβ150Updated 9 months ago