duty1g / dtyView external linksLinks
windows tiny reverse shell
☆27Mar 21, 2022Updated 3 years ago
Alternatives and similar repositories for dty
Users that are interested in dty are comparing it to the libraries listed below
Sorting:
- Polymorphic code obfuscator for use in Red Team operations☆32Apr 13, 2022Updated 3 years ago
- Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).☆14Apr 25, 2023Updated 2 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- ☆38Jan 3, 2022Updated 4 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- ☆23Oct 9, 2024Updated last year
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 2 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- Hellokitty Ransomware Source Code☆18Oct 7, 2023Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Jun 30, 2021Updated 4 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Jun 18, 2022Updated 3 years ago
- ☆27Mar 2, 2022Updated 3 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- Take domains on stdin and output them on stdout if they get resolved☆32May 27, 2022Updated 3 years ago
- ☆80Aug 2, 2023Updated 2 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- A small red team course☆40Jun 6, 2023Updated 2 years ago
- Red Team Templates For Obsidian.md☆32Jan 7, 2022Updated 4 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- Keep it secret, keep it safe☆80Feb 6, 2025Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Nov 1, 2023Updated 2 years ago
- Living off the False Positive!☆41Jan 31, 2025Updated last year
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Aug 3, 2020Updated 5 years ago
- ☆10Jan 2, 2022Updated 4 years ago
- A little implant which SSH's back with a shell☆38Feb 1, 2022Updated 4 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆41Dec 31, 2020Updated 5 years ago
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆40Feb 1, 2025Updated last year
- My python3 implementation of a Forward Shell☆36Jan 25, 2019Updated 7 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- A tool/library to proxify DLL☆38Apr 10, 2022Updated 3 years ago
- Combine words from two wordlist files and concatenate them with an optional delimiter☆38Sep 25, 2023Updated 2 years ago
- Get or remove RunMRU values☆61Dec 11, 2019Updated 6 years ago
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Jan 10, 2024Updated 2 years ago
- Overwrite a process's recovery callback and execute with WER☆103Apr 17, 2022Updated 3 years ago
- An open source application for the quick analysis of titration data.☆11May 1, 2021Updated 4 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- ☆10Nov 15, 2020Updated 5 years ago