☆19Sep 15, 2021Updated 4 years ago
Alternatives and similar repositories for NSAMeetingWithProxyShell
Users that are interested in NSAMeetingWithProxyShell are comparing it to the libraries listed below
Sorting:
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- ☆16Dec 7, 2025Updated 3 months ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆30Dec 31, 2021Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- ☆16Mar 26, 2024Updated last year
- ☆25Feb 9, 2022Updated 4 years ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 5 months ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆114Oct 21, 2023Updated 2 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Dec 8, 2022Updated 3 years ago
- Exploit for CVE-2024-4885☆17Jul 8, 2024Updated last year
- Exchangelib wrapper for pentesting☆67Feb 17, 2025Updated last year
- shouganaiyo-loader is a cross-platform Frida-based Node.js command-line tool that forces Java processes to load a Java/JVMTI agent regard…☆39Dec 30, 2021Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- ☆21Sep 12, 2025Updated 6 months ago
- CANAPE Network Testing Tool☆34Sep 25, 2018Updated 7 years ago
- Compiled binaries of various security tools☆14May 19, 2021Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- ☆16Jun 13, 2022Updated 3 years ago
- A demo of the relevant blog post: https://www.arashparsa.com/hook-heaps-and-live-free/☆193Sep 9, 2021Updated 4 years ago
- Synaptics Audio Driver LPE☆38Apr 15, 2019Updated 6 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- golang implementation of Syswhisper2/Syswhisper3☆23Mar 23, 2022Updated 3 years ago
- ☆22Jan 26, 2015Updated 11 years ago
- ☆26Mar 10, 2022Updated 4 years ago
- Collection of generic YARA rules☆16Aug 17, 2025Updated 7 months ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- Antivirus Emulator Fingerprints☆30Oct 12, 2018Updated 7 years ago
- ☆30Aug 19, 2020Updated 5 years ago