☆19Sep 15, 2021Updated 4 years ago
Alternatives and similar repositories for NSAMeetingWithProxyShell
Users that are interested in NSAMeetingWithProxyShell are comparing it to the libraries listed below
Sorting:
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 4 months ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- ☆25Feb 9, 2022Updated 4 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Compiled binaries of various security tools☆14May 19, 2021Updated 4 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆31Dec 31, 2021Updated 4 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago
- Collection of generic YARA rules☆16Aug 17, 2025Updated 6 months ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆115Oct 21, 2023Updated 2 years ago
- Exchangelib wrapper for pentesting☆67Feb 17, 2025Updated last year
- Antivirus Emulator Fingerprints☆30Oct 12, 2018Updated 7 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last week
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- MacOS Shared Library to Shellcode Loader☆51Updated this week
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Dec 8, 2022Updated 3 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Nov 6, 2016Updated 9 years ago
- Synaptics Audio Driver LPE☆38Apr 15, 2019Updated 6 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- ☆16Mar 26, 2024Updated last year
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- C# loader that copies a chunk at the time of the shellcode in memory, rather that all at once☆23Jul 14, 2022Updated 3 years ago