☆50Sep 20, 2022Updated 3 years ago
Alternatives and similar repositories for DDexec
Users that are interested in DDexec are comparing it to the libraries listed below
Sorting:
- Loads a program into a memfd and runs it.☆11May 22, 2022Updated 3 years ago
- Tool to rip system and user data from OSX and macOS☆16Dec 6, 2022Updated 3 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆880Mar 21, 2025Updated 11 months ago
- ☆16Nov 23, 2021Updated 4 years ago
- Malware to gain persistence on a victims machine.☆21Feb 12, 2023Updated 3 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- A simple Go module to retrieve host information through NTLMSSP challenges over HTTP(S) NTLM Authentication/RDP NLA/SMTP NTLM Authenticat…☆19Feb 20, 2026Updated last week
- MeowTools - maybe some useful tools for CTFers / programmers☆20Nov 27, 2022Updated 3 years ago
- Load a statically-linked ELF binary(x86 architecture) without the execve syscall.☆45Sep 20, 2020Updated 5 years ago
- a CTF AWD x86/x86_64 ELF binary auto-patcher.☆21Aug 12, 2021Updated 4 years ago
- Matryoshka - stacked LKM loader☆54Oct 8, 2023Updated 2 years ago
- Automated tool implementing Hash Length Extension Attack in MD4,MD5,SHA1,SHA256,SHA512 along with an example☆25Nov 16, 2024Updated last year
- Bash Recon Scan - Recon and Scan a network using Bash☆30Jun 19, 2022Updated 3 years ago
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- ☆29May 12, 2025Updated 9 months ago
- A repository for word lists I've generated☆35Dec 31, 2025Updated 2 months ago
- Module Stomping, No New Thread, HellsGate syscaller, UUID Shellcode Runner for x64 Windows 10!☆454Mar 8, 2023Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆58Feb 20, 2022Updated 4 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- ☆27Feb 19, 2026Updated 2 weeks ago
- Identify privilege escalation paths within and across different clouds☆718Feb 6, 2026Updated 3 weeks ago
- Volatility Dockerfile☆32Oct 3, 2022Updated 3 years ago
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆27Apr 23, 2023Updated 2 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Jun 1, 2023Updated 2 years ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Oct 26, 2023Updated 2 years ago
- ☆78Oct 18, 2022Updated 3 years ago
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year
- golang amsi bypass☆30Dec 4, 2021Updated 4 years ago
- anonymous to cluster-admin via Heapdump.☆30Nov 16, 2023Updated 2 years ago
- KrbRoastParser is a tool for parsing Kerberos packets from pcap files to extract AS-REQ, AS-REP and TGS-REP hashes☆57Sep 12, 2025Updated 5 months ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆82Oct 10, 2022Updated 3 years ago
- ☆145Oct 31, 2023Updated 2 years ago
- Minecraft mod that allow you to add an unlimited amount of your music as music discs.☆10Sep 6, 2025Updated 5 months ago
- ☆10Aug 9, 2024Updated last year
- Windows Privilege Escalation☆51Jun 8, 2022Updated 3 years ago
- ☆46Nov 7, 2024Updated last year
- ☆42Jan 13, 2023Updated 3 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Oct 30, 2022Updated 3 years ago
- Classic Web shell upload techniques & Web RCE techniques☆62Oct 4, 2025Updated 5 months ago