evilsocket / jscytheLinks
Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.
☆328Updated 8 months ago
Alternatives and similar repositories for jscythe
Users that are interested in jscythe are comparing it to the libraries listed below
Sorting:
- Intercept stdin/stdout/stderr for any process☆198Updated 2 years ago
- Take over macOS Electron apps' TCC permissions☆204Updated last year
- A crossplatform mDNS enumeration tool.☆353Updated 2 years ago
- Execute ELF files without dropping them on disk☆492Updated 11 months ago
- A web client port-scanner written in GO, that supports the WASM/WASI interface for Browser WebAssembly runtime execution.☆152Updated last year
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆243Updated 2 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆382Updated last year
- ☆63Updated 2 years ago
- Minimal code to connect to a CEF debugger.☆207Updated 4 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆520Updated 2 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆188Updated last year
- A fast and secure multi protocol honeypot.☆321Updated 2 years ago
- ☆112Updated 2 weeks ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious S…☆232Updated last year
- Blazing fast, advanced Padding Oracle exploit☆254Updated last year
- A unique technique to execute binaries from a password protected zip☆1,026Updated 2 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆842Updated 2 months ago
- Convert shellcode into different formats!☆353Updated 2 years ago
- ☆203Updated 7 months ago
- ☆104Updated 2 years ago
- Tool to test if you're in a Docker container and attempt simple breakouts☆139Updated 2 years ago
- Windows x64 handcrafted token stealing kernel-mode shellcode☆508Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆130Updated 2 years ago
- Injects additional machine instructions into various binary formats.☆282Updated last year
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆377Updated 3 years ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆501Updated this week
- CVE-2022-0995 exploit☆497Updated 3 years ago
- Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.☆233Updated 4 years ago