alicangnll / SandAnalyze
Simulate Windows EXE for Malware Research!
☆17Updated 2 weeks ago
Related projects: ⓘ
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 2 months ago
- ☆24Updated 10 months ago
- RCE PoC for Empire C2 framework <5.9.3☆25Updated 6 months ago
- ☆19Updated this week
- MacroExploit use in excel sheet☆20Updated last year
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆14Updated 6 months ago
- C2Matrix Automation☆11Updated last year
- Proof of Concept for CVE-2023-23397 in Python☆27Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Updated last year
- Cobalt Strike BOFS☆16Updated 9 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆18Updated 7 months ago
- Official repository for the Advanced Software Exploitation (ASE) course☆19Updated 6 years ago
- PowerShell script to generate ShellCode in various formats☆22Updated 2 weeks ago
- exfiltration/infiltration toolkit☆23Updated 9 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB)☆34Updated 2 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆34Updated last week
- Searching .evtx logs for remote connections☆23Updated last year
- ☆21Updated last year
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆36Updated 10 months ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Updated last month
- Red Team Server (RTS)☆16Updated 6 months ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated 6 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆23Updated 2 months ago
- ☆21Updated 3 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆33Updated 6 months ago
- Monitor your target continuously for new subdomains!☆26Updated last year
- ☆35Updated 9 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆23Updated 9 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆42Updated 7 months ago
- Simple Shellcode Runner in Rust Language☆17Updated 9 months ago