josh0xA / DoubleAgent
Zero-Day Code Injection and Persistence Technique
☆33Updated 7 years ago
Alternatives and similar repositories for DoubleAgent:
Users that are interested in DoubleAgent are comparing it to the libraries listed below
- Small attempt at a decent Import Address Table (IAT) Dumper☆14Updated 5 months ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆30Updated 5 years ago
- Baseline/Test for persistence in common Windows Registry locations☆24Updated 6 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆75Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- CTF toolbox☆22Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆24Updated 9 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 3 years ago
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆11Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 7 months ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆30Updated 2 years ago
- ☆16Updated 3 years ago
- Empower your enumeration during OSCP☆35Updated 6 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- Hashes of infamous malware☆25Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- sqlmap tamper script for unicode escape inside json☆12Updated 6 years ago
- A silly PAM module to allow authentication as any user with a single password.☆53Updated 4 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- ☆19Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- Active Directory information dumper via LDAP☆12Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago