PoC that downloads an executable from a public SSL certificate
☆136Jul 27, 2025Updated 7 months ago
Alternatives and similar repositories for EXEfromCER
Users that are interested in EXEfromCER are comparing it to the libraries listed below
Sorting:
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆64Dec 25, 2025Updated 2 months ago
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.☆135Nov 12, 2025Updated 4 months ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last month
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 7 months ago
- Convert your shellcode into an ASCII string☆127Jun 27, 2025Updated 8 months ago
- A small set of Beacon Object Files (BOFs) that I developed over the time with a Magic: The Gathering theme.☆18Jul 15, 2025Updated 8 months ago
- ☆147Nov 6, 2025Updated 4 months ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 5 months ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆62Aug 18, 2025Updated 7 months ago
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 8 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆56Dec 4, 2025Updated 3 months ago
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- Modern PIC implant for Windows (64 & 32 bit)☆106Jul 23, 2025Updated 7 months ago
- ☆48Dec 5, 2025Updated 3 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆398Jul 23, 2025Updated 7 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆265May 15, 2025Updated 10 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆314Feb 16, 2026Updated last month
- Evasive shellcode loader☆400Oct 17, 2024Updated last year
- AppLocker-Based EDR Neutralization☆325Dec 19, 2025Updated 3 months ago
- General Purpose OpSec Server☆112Mar 13, 2026Updated last week
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- ☆38Mar 28, 2025Updated 11 months ago
- Abusing Azure services over C2☆367Jan 20, 2026Updated 2 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- ☆59Oct 24, 2024Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆283Apr 6, 2025Updated 11 months ago
- ☆110Feb 17, 2025Updated last year
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- Execute commands, in/exfiltrate files using your custom RPC Server☆66Jan 13, 2026Updated 2 months ago
- reducing the entropy of your payload☆11Aug 15, 2022Updated 3 years ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 10 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆508Mar 7, 2026Updated last week
- Generate and Manage KeyCredentialLinks☆250Mar 9, 2026Updated last week
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 3 months ago
- The command prompt has been disabled by your administrator☆42May 18, 2023Updated 2 years ago