Zeyad-Azima / ShellcodeGenZLinks
GenZ Shellcode Generator to execute commands with winExec API
☆20Updated last month
Alternatives and similar repositories for ShellcodeGenZ
Users that are interested in ShellcodeGenZ are comparing it to the libraries listed below
Sorting:
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 10 months ago
- ☆22Updated 3 months ago
- Dumping LSASS Evaded Endpoint Security Solutions☆13Updated 4 months ago
- ☆55Updated 8 months ago
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 8 months ago
- Tool to obtain hash using MS-SNTP for user accounts☆24Updated 5 months ago
- Beacon Object Files (BOF) for Cobalt Strike.☆31Updated 10 months ago
- Tool to aid in dumping LSASS process remotely☆40Updated 10 months ago
- in-process powershell runner for BRC4☆45Updated last year
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- A simple C++ Windows tool to get information about processes exposing named pipes.☆38Updated 3 months ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆23Updated 4 months ago
- ☆48Updated 2 years ago
- ☆56Updated 4 months ago
- A python script that automates a C2 Profile build☆42Updated 3 months ago
- Exploit for CVE-2024-5009☆13Updated 11 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 9 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆32Updated 2 months ago
- Cobalt Strike BOFS☆16Updated last year
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.☆52Updated last month
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- ☆35Updated this week
- Enumerate the Domain for Readable and Writable Shares☆20Updated 4 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆42Updated 10 months ago
- ☆38Updated 4 months ago
- ☆18Updated 6 months ago
- ☆25Updated 3 months ago