Linux x86_64 Process Injection Utility
☆58Mar 9, 2021Updated 4 years ago
Alternatives and similar repositories for K55
Users that are interested in K55 are comparing it to the libraries listed below
Sorting:
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)☆136Jan 13, 2026Updated last month
- Apply a filter to the events being reported by windows event logging☆263Apr 24, 2021Updated 4 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- proxy your C2 traffic through CDN using websocket☆52Jul 24, 2022Updated 3 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆109Oct 10, 2020Updated 5 years ago
- A forensic evidence acquirer☆86Apr 14, 2021Updated 4 years ago
- Emulate and Dissect MSF and *other* attacks☆143Feb 28, 2024Updated 2 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Userland API Unhooker Project☆111Jun 14, 2021Updated 4 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆66Jan 24, 2022Updated 4 years ago
- DLLHSC - DLL Hijack SCanner a tool to assist with the discovery of suitable candidates for DLL Hijacking☆156Jun 30, 2020Updated 5 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆116Feb 27, 2021Updated 5 years ago
- A canary designed to minimize the impact from certain Ransomware actors☆102Mar 3, 2021Updated 5 years ago
- ☆73Jul 29, 2021Updated 4 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 5 years ago
- Best Graphical Hacking Platform Online☆37Apr 4, 2020Updated 5 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Jul 23, 2020Updated 5 years ago
- ☆28Oct 4, 2021Updated 4 years ago
- Inject .NET assemblies into an existing process☆507Jan 19, 2022Updated 4 years ago
- A Simple Linux ELF Runtime Crypter☆271Feb 25, 2025Updated last year
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Aug 8, 2024Updated last year
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- DLL Unhooking☆13Mar 26, 2021Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- ☆30Jul 28, 2024Updated last year
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Aug 31, 2023Updated 2 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆132Nov 7, 2024Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Sep 11, 2021Updated 4 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆220May 3, 2023Updated 2 years ago
- A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.☆201Sep 21, 2021Updated 4 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆205Jul 2, 2024Updated last year