josh0xA / DoubleAgent
Zero-Day Code Injection and Persistence Technique
☆31Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for DoubleAgent
- Small attempt at a decent Import Address Table (IAT) Dumper☆14Updated 2 months ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆73Updated last year
- Baseline/Test for persistence in common Windows Registry locations☆23Updated 5 years ago
- A silly PAM module to allow authentication as any user with a single password.☆53Updated 4 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆23Updated 6 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆29Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 5 years ago
- Windows Keylogger in C++☆17Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆28Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 10 months ago
- ☆51Updated 3 years ago
- ☆24Updated 5 years ago
- ☆20Updated 3 years ago
- CTF toolbox☆20Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 4 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆46Updated 3 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A shell script that mimics sudo and sends you back the password☆42Updated last year
- Wireless Pentesting Device☆20Updated 4 years ago
- A simple "ransomware" using powershell☆13Updated 3 years ago
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago
- AV/EDR evasion via direct system calls.☆32Updated 3 years ago
- HTTP botnet☆60Updated 8 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 7 months ago
- x64 Windows Exploit Development☆109Updated 2 months ago
- Modern problems require modern solutions☆31Updated 2 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆173Updated 3 months ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆23Updated 5 years ago
- Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.☆43Updated 3 years ago