ict / creddump7
☆10Updated 5 years ago
Alternatives and similar repositories for creddump7:
Users that are interested in creddump7 are comparing it to the libraries listed below
- load dumped csharp binaries as assemblies and launch them in memory☆26Updated last year
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- Working repo used to experiment with various languages as it relates to offensive security & evasion.☆31Updated 8 months ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆19Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Public repo of some woking evilginx phishlets☆28Updated 3 months ago
- ☆16Updated 4 months ago
- ☆47Updated last year
- Reasonably undetected shellcode stager and executer.☆35Updated 5 months ago
- ☆29Updated last year
- Smuggle a file to a user's browser☆19Updated 2 years ago
- Run python from a single exe☆34Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Create a lnk shortcut file for Windows☆13Updated 5 years ago
- My implementation of Halo's Gate technique in C#☆53Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆22Updated last year
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆50Updated 3 years ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆23Updated 6 months ago
- ☆58Updated last year
- Right-To-Left Override POC☆34Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- API Hammering with C++20☆45Updated 2 years ago
- A more reliable way of resolving syscall numbers in Windows☆48Updated last year
- maldev obviously☆25Updated 3 weeks ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 3 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆30Updated last year
- Bypassing Amsi using LdrLoadDll☆37Updated last month