Reverse_Shell Implemented in C++ with the ability to bypass sandboxes
☆12Apr 2, 2021Updated 4 years ago
Alternatives and similar repositories for Camus
Users that are interested in Camus are comparing it to the libraries listed below
Sorting:
- ☆12Feb 20, 2022Updated 4 years ago
- A simple tool to inject shellcode into the remote process with the ability to spoof parent process.☆16Mar 18, 2021Updated 4 years ago
- It's a CLI Unity DLL Injector.☆12Aug 8, 2019Updated 6 years ago
- Reference of Vehicle Security。☆13Aug 13, 2021Updated 4 years ago
- Advanced Sub-domain Enumerator☆10Mar 14, 2020Updated 5 years ago
- Subdomain finder☆10Mar 13, 2025Updated 11 months ago
- (Sim)ulate (Ba)zar Loader☆28Nov 15, 2020Updated 5 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆35Aug 21, 2023Updated 2 years ago
- Writeup and scripts for the 2021 malwarebytes crackme☆11Nov 9, 2021Updated 4 years ago
- Single Repository to keep policy and simmilar documentation☆35Feb 16, 2025Updated last year
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- A wrapper for memory hacking related functions (WriteProcessMemory, ReadProcessMemory, etc) as well as a DLL injection function and patte…☆17May 29, 2020Updated 5 years ago
- Demonstrates iterative FGSM on Apple's NeuralHash model.☆16Aug 19, 2021Updated 4 years ago
- burpplugin 根据一遍神贴,实现了一下burp插件版本的小刀,一键生成shell☆14Jul 15, 2019Updated 6 years ago
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- A python-based padding oracle tool☆20Aug 14, 2024Updated last year
- QilingLab challenge writeup☆22Sep 25, 2021Updated 4 years ago
- ☆17Jan 27, 2022Updated 4 years ago
- Skywalking远程代码执行漏洞验证☆19Feb 22, 2021Updated 5 years ago
- CTF Challenge☆18Nov 20, 2020Updated 5 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- PDB Dumping Tool☆60Nov 7, 2022Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆23May 24, 2020Updated 5 years ago
- Decompress Xamarin .NET compressed binaries so they can be decompiled.☆48Oct 7, 2020Updated 5 years ago
- Automate the process of an S3 bucket subdomain takeover via dangling CNAME record☆26May 20, 2024Updated last year
- ☆11Feb 14, 2023Updated 3 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆108Mar 8, 2023Updated 2 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- Some CTF Write-ups☆27Feb 7, 2022Updated 4 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆49Jul 8, 2025Updated 7 months ago
- 这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,理解ECC算法、Windows验证机制,并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者,自己确实很菜,但希望坚持下去,加油!☆30Feb 17, 2020Updated 6 years ago
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- shw's CTF challenges☆27Apr 5, 2021Updated 4 years ago
- AutoVAS is an automated vulnerability analysis system with a deep learning approach.☆35Sep 2, 2021Updated 4 years ago
- Analysis of the Enterprise SAST/DAST product landscape☆38Feb 28, 2024Updated 2 years ago
- ☆36Jun 21, 2024Updated last year