PIC code gen and loading
☆13Jul 25, 2017Updated 8 years ago
Alternatives and similar repositories for C-OSX-Shellcode
Users that are interested in C-OSX-Shellcode are comparing it to the libraries listed below
Sorting:
- Powershell Persistence Locator☆67Sep 11, 2016Updated 9 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- ☆16Jun 1, 2018Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- The Damn Vulnerable Router Firmware Project☆30Feb 5, 2018Updated 8 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24May 1, 2014Updated 11 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)☆19May 22, 2019Updated 6 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Pebble Watchface: Multifunctional Seven Segment☆11Nov 27, 2017Updated 8 years ago
- Offensive Data Storage☆61Sep 1, 2016Updated 9 years ago
- Objective C dylibHijackScanner and analysis tool☆40Jul 12, 2023Updated 2 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- Helpful operator notes and techniques in actionable form☆17Aug 11, 2023Updated 2 years ago
- .NET applications hacking toolset☆18Jan 12, 2021Updated 5 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Oct 17, 2018Updated 7 years ago
- VirtualBox Virtual Machines used for IPv6 training☆11Jun 6, 2016Updated 9 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67May 27, 2018Updated 7 years ago
- JavaScript for Automation (JXA) version of Patrick Wardle's tool that searches applications for dylib hijacking opportunities☆22Aug 6, 2019Updated 6 years ago
- Active Directory enumeration from non-domain system.☆118Dec 15, 2016Updated 9 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- ☆11Mar 11, 2015Updated 11 years ago
- Help recover passwords / etc. that were incorrectly entered with a typo☆13Jan 24, 2017Updated 9 years ago
- Vivisect Structure Definition/Parsing Library☆23Jul 25, 2017Updated 8 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆156Apr 7, 2023Updated 2 years ago
- A simple SOCKS5 server written in Go☆31Nov 7, 2016Updated 9 years ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆35Sep 24, 2022Updated 3 years ago