josh0xA / DoubleAgentLinks
Zero-Day Code Injection and Persistence Technique
☆33Updated 8 years ago
Alternatives and similar repositories for DoubleAgent
Users that are interested in DoubleAgent are comparing it to the libraries listed below
Sorting:
- Small attempt at a decent Import Address Table (IAT) Dumper☆15Updated 10 months ago
- A silly PAM module to allow authentication as any user with a single password.☆55Updated 5 years ago
- Ansible scripts to install tools and files wanted on a new Kali Machine☆32Updated 5 years ago
- Baseline/Test for persistence in common Windows Registry locations☆24Updated 6 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆77Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- CTF toolbox☆22Updated 2 years ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆11Updated 8 years ago
- ☆19Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆17Updated 3 years ago
- SMBMap is a handy SMB enumeration tool☆37Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- ☆52Updated 4 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆13Updated 3 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Wireless Pentesting Device☆22Updated 4 years ago
- Automation scripts in preparation for PWK/OSCP labs☆17Updated 3 years ago
- ☆23Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- ☆16Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago