cyberspacekittens / metasploit-payloadsLinks
Unified repository for different Metasploit Framework payloads
☆10Updated 7 years ago
Alternatives and similar repositories for metasploit-payloads
Users that are interested in metasploit-payloads are comparing it to the libraries listed below
Sorting:
- ☆45Updated 7 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- Initial Commit of Coresploit☆57Updated 4 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆54Updated 6 years ago
- Suite of Shellcode Running Utilities☆113Updated 5 years ago
- External C2 Using IE COM Objects☆102Updated 6 years ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆66Updated 5 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- few months old but better than nothing☆58Updated 3 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆25Updated 7 years ago
- POC for Cobalt Strike external C2☆140Updated 4 years ago
- ☆53Updated 7 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Updated 9 years ago
- ☆45Updated 6 years ago
- Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61☆39Updated 8 years ago
- ☆78Updated 7 years ago
- ☆35Updated 8 years ago
- Python api for usage with cobalt strike's External C2 specification☆63Updated 7 years ago
- Proxy system calls over an RPC channel☆99Updated 3 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆24Updated 6 years ago
- ☆46Updated 4 years ago
- ☆37Updated 7 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Updated 5 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆70Updated 4 years ago
- .NET tool for enumeration processes and dumping memory.☆57Updated 6 years ago
- Experiments on the Windows Internals☆31Updated 6 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆140Updated 2 years ago
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53Updated 7 years ago
- named pipe server with impersonation☆60Updated 6 years ago