bananabr / natslipstream
NAT Slipstream attack code samples
☆46Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for natslipstream
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆44Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆29Updated last year
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆22Updated 2 years ago
- A little implant which SSH's back with a shell☆36Updated 2 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆42Updated 4 years ago
- Finds imports that could be exploited, still requires manual analysis.☆26Updated 2 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- ☆31Updated 3 years ago
- Adobe Reader DC Information Leak Exploit☆22Updated 2 years ago
- all credits go to @mgeeky☆58Updated 3 years ago
- A collection of weaponized LPE exploits written in Go☆49Updated 3 weeks ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆43Updated 2 years ago
- My nim learning experiments☆11Updated 2 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆30Updated 4 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 2 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆44Updated 2 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆50Updated 2 years ago
- ☆19Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆42Updated 3 years ago
- DO NOT RUN THIS.☆10Updated 3 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆71Updated 9 months ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Standalone Go implementation of Metasploit's "db_nmap" and "db_import" commands.☆16Updated this week