Create a lnk shortcut file for Windows
☆24Apr 23, 2019Updated 6 years ago
Alternatives and similar repositories for mklnk
Users that are interested in mklnk are comparing it to the libraries listed below
Sorting:
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Feb 9, 2021Updated 5 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- This repo contains example software for the Kernelcon 2021 Hack Live! badge - the Hacker HotKey.☆17May 7, 2021Updated 4 years ago
- Thanks to @d35ha☆13Aug 16, 2021Updated 4 years ago
- Rewriting Armitage in Kotlin for the latest Metasploit☆16Apr 12, 2023Updated 2 years ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆16Apr 30, 2021Updated 4 years ago
- ☆72Aug 2, 2022Updated 3 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆15Apr 26, 2021Updated 4 years ago
- Modular C2 server to tame your pack of wolves☆22Updated this week
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Bypass Windows defender syscall☆18Jul 17, 2021Updated 4 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- ☆40May 21, 2022Updated 3 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 2 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Aug 4, 2021Updated 4 years ago
- Change hash for a signed pe☆17Jul 18, 2023Updated 2 years ago
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆27Mar 19, 2025Updated 11 months ago
- wsnet☆26Feb 19, 2026Updated last week
- POC for CVE-2025-54918 and a technical demonstration.☆53Jan 12, 2026Updated last month
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆58Feb 2, 2026Updated last month
- macOS shellcode loader written in Objective-C☆49Jul 15, 2022Updated 3 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Jul 31, 2022Updated 3 years ago
- ☆13May 24, 2023Updated 2 years ago
- EventViewer Bypass Uac Bof☆23Jul 23, 2022Updated 3 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- A little scanner to check the LDAP Signing state☆46Aug 2, 2021Updated 4 years ago
- This repository is a collection of my malicious VBA projects.☆119Feb 13, 2021Updated 5 years ago
- XOR-based shellcode encoder☆30Apr 20, 2023Updated 2 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Mar 31, 2022Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆247Feb 23, 2022Updated 4 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Feb 27, 2019Updated 7 years ago
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.☆45Dec 19, 2025Updated 2 months ago