knight0x07 / Lnk2VbsView external linksLinks
A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.
☆33Dec 5, 2022Updated 3 years ago
Alternatives and similar repositories for Lnk2Vbs
Users that are interested in Lnk2Vbs are comparing it to the libraries listed below
Sorting:
- A Bumblebee-inspired Crypter☆79Dec 5, 2022Updated 3 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆40Aug 8, 2022Updated 3 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Oct 10, 2022Updated 3 years ago
- ☆47Feb 11, 2023Updated 3 years ago
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- An open-source process injection enumeration tool written in C#☆174Dec 16, 2022Updated 3 years ago
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 2 years ago
- Koppeling x Metatwin x LazySign☆216Aug 26, 2021Updated 4 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- A simple PoC to invoke an encrypted shellcode by using an hidden call☆116Nov 19, 2022Updated 3 years ago
- ☆21May 17, 2023Updated 2 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Aug 28, 2023Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Dec 15, 2023Updated 2 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- ☆13Feb 25, 2023Updated 2 years ago
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated 11 months ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 10 months ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- ☆11Apr 2, 2022Updated 3 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 7 months ago
- ☆80Aug 2, 2023Updated 2 years ago
- An injector that aims to be stealthy by using non suspicious API calls. Inspired by (https://github.com/FuzzySecurity/Sharp-Suite/tree/ma…☆24Jun 17, 2020Updated 5 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Aug 25, 2021Updated 4 years ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆205Jun 23, 2023Updated 2 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆146May 18, 2024Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Some of my custom "tools".☆28Feb 21, 2022Updated 3 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- ☆60Jan 9, 2023Updated 3 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆55May 8, 2023Updated 2 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 7 months ago
- really ?☆12Feb 29, 2024Updated last year
- WNF Code Execution Library Using C#☆110May 18, 2020Updated 5 years ago