darksh3llRU / dark-dohView external linksLinks
☆19Dec 12, 2023Updated 2 years ago
Alternatives and similar repositories for dark-doh
Users that are interested in dark-doh are comparing it to the libraries listed below
Sorting:
- ☆12Jun 22, 2022Updated 3 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- ☆37Feb 11, 2023Updated 3 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- ☆10Oct 9, 2024Updated last year
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆34Feb 2, 2026Updated last week
- Harvis is designed to automate your C2 Infrastructure.☆107Jul 10, 2022Updated 3 years ago
- Script to test NetSec capabilities.☆21May 1, 2023Updated 2 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- XOR-based shellcode encoder☆30Apr 20, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- ☆14May 20, 2019Updated 6 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Jun 26, 2023Updated 2 years ago
- All my POC related to malware development☆14May 13, 2024Updated last year
- ☆30Jul 28, 2024Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- ☆80Apr 18, 2023Updated 2 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- A C# port of the MinHook API hooking library☆56Oct 5, 2022Updated 3 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆35Feb 10, 2021Updated 5 years ago
- ☆34Apr 24, 2024Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Jun 30, 2021Updated 4 years ago
- ☆86Aug 18, 2022Updated 3 years ago