arget13 / DDexec
A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.
☆814Updated last year
Alternatives and similar repositories for DDexec:
Users that are interested in DDexec are comparing it to the libraries listed below
- Execute ELF files without dropping them on disk☆490Updated 7 months ago
- Open-Source Shellcode & PE Packer☆1,880Updated last year
- CVE-2022-0185☆367Updated 2 years ago
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,098Updated 6 months ago
- Windows Privilege Escalation from User to Domain Admin.☆1,361Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,167Updated last year
- A small reverse shell for Linux & Windows☆596Updated 8 months ago
- Shikata ga nai (仕方がない) encoder ported into go with several improvements☆1,605Updated 11 months ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆896Updated 8 months ago
- A tool to make socks connections through HTTP agents☆689Updated 3 years ago
- a tool to help operate in EDRs' blind spots☆698Updated 2 months ago
- ☆1,591Updated 5 months ago
- The swiss army knife of LSASS dumping☆1,852Updated 4 months ago
- exploit for CVE-2022-2588☆478Updated last year
- A tool to kill antimalware protected processes☆1,412Updated 3 years ago
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆951Updated 2 years ago
- Syscall Shellcode Loader (Work in Progress)☆1,156Updated 9 months ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,463Updated last year
- Another Windows Local Privilege Escalation from Service Account to System☆830Updated 2 years ago
- reverse shell using curl☆452Updated 9 months ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆714Updated last year
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆951Updated 2 years ago
- Extract credentials from lsass remotely☆2,084Updated last month
- Repository for information about 0-days exploited in-the-wild.☆778Updated 2 weeks ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,438Updated last year
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆832Updated 3 weeks ago
- The Hunt for Malicious Strings☆1,161Updated 2 years ago
- ☆2,047Updated last year
- Abusing impersonation privileges through the "Printer Bug"☆1,935Updated 4 years ago
- Sudo Baron Samedit Exploit☆742Updated 3 years ago