d1mov / evillnkLinks
Python GUI based tool to generate lnk files with a payload and decoy files embedded inside.
☆27Updated 2 weeks ago
Alternatives and similar repositories for evillnk
Users that are interested in evillnk are comparing it to the libraries listed below
Sorting:
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆438Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆444Updated 10 months ago
- PDF dropper Red Team Scenairos☆221Updated last year
- Reverse shell that can bypass windows defender detection☆167Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆118Updated last year
- micr0shell is a Python script that dynamically generates Windows X64 PIC Null-Free reverse shell shellcode.☆196Updated last year
- Embed a payload inside a PNG file☆345Updated 10 months ago
- PowerShell Obfuscator☆192Updated last week
- 「🛡️」AVs/EDRs Evasion tool☆104Updated 8 months ago
- Heavily obfuscated PowerShell reverse shell that can bypass Windows Defender☆22Updated 8 months ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆108Updated last month
- EDR & Antivirus Bypass to Gain Shell Access☆247Updated 11 months ago
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆272Updated 5 months ago
- Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advance…☆553Updated 3 months ago
- Persistent Powershell backdoor tool {😈}☆119Updated last year
- AdaptixFramework Extension Kit☆224Updated last week
- Evasive shellcode loader☆382Updated 10 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆252Updated 2 years ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆187Updated 6 months ago
- Automated Multi UAC BYPASS for win10|win11|win12-pre-release|ws2019|ws2022☆448Updated 10 months ago
- AV bypass while you sip your Chai!☆224Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆413Updated 3 weeks ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆436Updated last year
- Awesome AV/EDR/XDR Bypass Tips☆280Updated 2 years ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆328Updated 5 months ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆548Updated last year
- Shellcode loader generator with multiples features☆493Updated 8 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆527Updated 4 months ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆287Updated 4 months ago
- Stealthily inject shellcode into an executable☆262Updated 2 months ago