Abuse the node.js inspector mechanism in order to force any node.js/electron/v8 based process to execute arbitrary javascript code.
☆333Sep 9, 2024Updated last year
Alternatives and similar repositories for jscythe
Users that are interested in jscythe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated 2 months ago
- ☆12Oct 9, 2022Updated 3 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- If you have any questions, please open an issue.☆25Apr 6, 2022Updated 4 years ago
- A crossplatform mDNS enumeration tool.☆362Sep 25, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Sep 15, 2022Updated 3 years ago
- Pure Go rewrite of knockknock☆11Feb 7, 2023Updated 3 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆797Sep 30, 2022Updated 3 years ago
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆229Aug 19, 2022Updated 3 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆620Sep 26, 2023Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆91Dec 15, 2022Updated 3 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆533Aug 1, 2022Updated 3 years ago
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- COFF and BOF Loader written in Nim☆173Updated this week
- ☆511Aug 14, 2022Updated 3 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆36Sep 4, 2022Updated 3 years ago
- ☆153Jan 6, 2023Updated 3 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆344Sep 1, 2021Updated 4 years ago
- Sustainable shellcode evasion☆113Mar 20, 2026Updated 2 weeks ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆401Aug 15, 2025Updated 7 months ago
- ☆119Aug 7, 2022Updated 3 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking.☆314Jul 8, 2022Updated 3 years ago
- Use "Full Disk Access" permissions to read the contents of TCC.db and display it in human-readable format☆40Jul 27, 2021Updated 4 years ago
- A standalone tool for logging shell commands to GhostWriter automatically☆18Aug 24, 2024Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆234Oct 18, 2022Updated 3 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,953Apr 7, 2024Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 4 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- A rust based DLL injection project☆31Sep 18, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- UAC bypass by abusing RPC and debug objects.☆629Oct 19, 2023Updated 2 years ago
- Windows x64 handcrafted token stealing kernel-mode shellcode☆509Apr 17, 2024Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆745Aug 18, 2023Updated 2 years ago
- Leaked Windows processes handles identification tool☆289Mar 14, 2022Updated 4 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Aug 5, 2022Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆378Dec 26, 2022Updated 3 years ago