lawrenceamer / Revenant
☆9Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Revenant
- active directory query tool using LDAP Protocol , helps red teamer / penetration testers to validate users credentials , retrieve inform…☆12Updated 4 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- ☆12Updated 2 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆49Updated 3 years ago
- ☆10Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Some random system tools for Windows☆106Updated 2 years ago
- I used this to see if an EDR is running in Safe Mode☆33Updated 3 years ago
- CVE-2021-26855: PoC (Not a HoneyPoC for once!)☆27Updated 3 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆40Updated last year
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 4 years ago
- Execute Mimikatz with different technique☆50Updated 3 years ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 5 years ago
- Bypass Windows defender syscall☆18Updated 3 years ago
- MySQL Injection Exfoliation Optimization☆23Updated 5 years ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Updated 4 years ago
- Bypass AMSI☆14Updated 3 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆56Updated 3 years ago
- Injects HTML/PHP/ASP to the PE☆97Updated 4 years ago
- Run shellcode through InnoSetup code engine.☆66Updated last year
- CVE-2020-1048 bypass: binary planting PoC☆32Updated 4 years ago