idfp / lnk-builder
Malicious shortcut file builder for spear-phishing and red-team engagement.
☆12Updated last year
Alternatives and similar repositories for lnk-builder:
Users that are interested in lnk-builder are comparing it to the libraries listed below
- wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures …☆33Updated 8 months ago
- PowerShell script to terminate protected processes such as anti-malware and EDRs.☆26Updated last year
- C# havoc implant☆98Updated 2 years ago
- ☆79Updated last year
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆46Updated last year
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆76Updated last year
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆81Updated 2 years ago
- Aggressor script add-in for CobaltStrike to track file uploads☆36Updated 2 years ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆42Updated 10 months ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- Terminate AV/EDR leveraging BYOVD attack☆80Updated last year
- Modified versions of the Cobalt Strike Process Injection Kit☆92Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated last year
- Winsocket for Cobalt Strike.☆97Updated last year
- ☆55Updated 10 months ago
- ☆95Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 3 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆106Updated last year
- Using syscall to load shellcode, Evasion techniques☆27Updated 3 years ago
- Secretsdump C# version only supporting local (live) operation☆48Updated last year
- Run Cobalt Strike BOFs in Brute Ratel C4!☆61Updated last month
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆36Updated 2 years ago
- .bin file to shellcode convertor☆33Updated 7 months ago
- A collection of (even more) alternative shellcode callback methods in CSharp☆69Updated 3 months ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 2 years ago
- ☆51Updated 2 years ago
- ☆63Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆73Updated 2 years ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆74Updated last month
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆83Updated 2 years ago