deeexcee-io / LOI-BinsView external linksLinks
Abusing Remote Windows SMB Shares for Fun and Pen Testing
☆15May 23, 2023Updated 2 years ago
Alternatives and similar repositories for LOI-Bins
Users that are interested in LOI-Bins are comparing it to the libraries listed below
Sorting:
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118May 2, 2024Updated last year
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- ☆22Jun 9, 2025Updated 8 months ago
- A simple tool for detecting memory modifications to Windows API.☆23Jan 9, 2025Updated last year
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 9 months ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆55Apr 4, 2023Updated 2 years ago
- ☆52Feb 8, 2024Updated 2 years ago
- DNS server for pentesters☆50Nov 2, 2025Updated 3 months ago
- DynamicSyscalls is a library written in .net resolves the syscalls dynamically (Has nothing to do with hooking/unhooking)☆66Nov 13, 2022Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- ☆222Mar 10, 2024Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- Quick and dirty PoSH code to read teams messages☆23Feb 5, 2025Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Nov 24, 2019Updated 6 years ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆63Sep 11, 2023Updated 2 years ago
- cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50☆25Jan 23, 2023Updated 3 years ago
- ☆61Dec 15, 2023Updated 2 years ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆482Oct 14, 2022Updated 3 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆32Feb 3, 2023Updated 3 years ago
- ☆29Sep 4, 2024Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆38Dec 7, 2025Updated 2 months ago
- Fork from @rsmudge/armitage☆34Dec 6, 2022Updated 3 years ago
- ☆80Aug 2, 2023Updated 2 years ago
- Pass the Hash to a named pipe for token Impersonation☆146May 1, 2021Updated 4 years ago
- C# User Simulation☆33Oct 6, 2022Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- Call virtual methods on C++ classes from Go without cgo.☆88Feb 1, 2024Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆77Feb 8, 2023Updated 3 years ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Jun 2, 2017Updated 8 years ago
- Powershell version of SharpGPOAbuse☆90May 21, 2021Updated 4 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Jun 20, 2022Updated 3 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago