fksvs / inject
Packet crafting, injection and sniffing tool
☆56Updated 3 months ago
Related projects: ⓘ
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆16Updated 3 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆38Updated 4 years ago
- hiding in plain sight: part 2☆40Updated 2 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆41Updated last year
- Repo for all my exploits/PoCs☆28Updated last week
- Rust Weaponization for Red Team Engagements.☆11Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆28Updated last year
- ☆22Updated 2 years ago
- Rubber Ducky powered by NeoKey☆18Updated 3 months ago
- exfiltration/infiltration toolkit☆23Updated 9 months ago
- ☆26Updated this week
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆13Updated last year
- XOR-based shellcode encoder☆31Updated last year
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆25Updated this week
- ASUS wifi router RCE vulnerability☆12Updated last week
- An offensive security framework for writing payloads☆13Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆42Updated last year
- Enumeration & fingerprint tool☆23Updated 6 months ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 10 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆37Updated 9 months ago
- A collection of beautified and commented samples of malware implemented in Bash☆9Updated last year
- Modular framework to exploit UPS devices☆61Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆33Updated 6 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆77Updated 7 months ago
- ☆28Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆18Updated 7 months ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆29Updated last month