ferreiraklet / wolfyLinks
Wolfy AV Bypasser
☆29Updated 2 years ago
Alternatives and similar repositories for wolfy
Users that are interested in wolfy are comparing it to the libraries listed below
Sorting:
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures …☆49Updated 2 months ago
- An aggressor script that can help automate payload building in Cobalt Strike☆117Updated last year
- ☆102Updated 2 years ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆120Updated 6 months ago
- ☆88Updated last year
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated 2 years ago
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆157Updated 2 years ago
- ☆93Updated 2 years ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated 2 years ago
- ☆95Updated 5 months ago
- ☆18Updated last year
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆53Updated last year
- Easy phishing environment builder (Red Team)☆16Updated last year
- Dump Windows SAM hashes☆42Updated 2 years ago
- Zimbra - Remote Command Execution (CVE-2024-45519)☆134Updated 8 months ago
- Exploit for the CVE-2024-5806☆45Updated last year
- Proof-of-concept exploit for CVE-2024-25153.☆42Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated 2 years ago
- A shellcode injection tool showcasing various process injection techniques☆136Updated 2 years ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆207Updated last year
- tomcat CVE-2024-50379/CVE-2024-56337 条件竞争文件上传exp☆85Updated last year
- A RunAs clone with the ability to specify the password as an argument.☆112Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆114Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago
- Offensive MSSQL toolkit written in Python, based off SQLRecon☆203Updated 11 months ago
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆197Updated last year
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆42Updated 3 years ago
- ☆221Updated last year
- .bin file to shellcode convertor☆39Updated last year
- Golden collection of weak passwords☆69Updated last year