hackerhouse-opensource / OffensiveLuaLinks
Offensive Lua.
☆188Updated last year
Alternatives and similar repositories for OffensiveLua
Users that are interested in OffensiveLua are comparing it to the libraries listed below
Sorting:
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆176Updated last year
- ☆189Updated last year
- ☆282Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆260Updated last year
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆135Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆201Updated last year
- An interactive shell to spoof some LOLBins command line☆184Updated last year
- A shellcode injection tool showcasing various process injection techniques☆137Updated last year
- ☆299Updated 3 months ago
- 「💀」Proof of concept on BYOVD attack☆161Updated 6 months ago
- Different methods to get current username without using whoami☆177Updated last year
- Execute shellcode files with rundll32☆204Updated last year
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆189Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆193Updated 3 months ago
- ☆135Updated 2 weeks ago
- ☆177Updated 10 months ago
- ☆164Updated last year
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆348Updated 4 months ago
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆303Updated last year
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆158Updated this week
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆196Updated 3 months ago
- Nameless C2 - A C2 with all its components written in Rust☆268Updated 9 months ago
- A bunch of scripts and code i wrote.☆141Updated 7 months ago
- yet another AV killer tool using BYOVD☆292Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆314Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆265Updated 9 months ago
- ☆221Updated last year