mgeeky / injectAllTheThingsView external linksLinks
Seven different DLL injection techniques in one single project.
☆13May 19, 2020Updated 5 years ago
Alternatives and similar repositories for injectAllTheThings
Users that are interested in injectAllTheThings are comparing it to the libraries listed below
Sorting:
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 10 months ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 2 years ago
- ☆18Jun 25, 2024Updated last year
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 3 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- AV/EDR evasion via direct system calls.☆32Dec 7, 2020Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Aug 6, 2018Updated 7 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Oct 24, 2021Updated 4 years ago
- A tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆17Jan 13, 2024Updated 2 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 10 months ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- Default Password Generator for Time Warner / Spectrum Routers☆19Jul 27, 2017Updated 8 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆21Sep 30, 2025Updated 4 months ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆23Apr 22, 2017Updated 8 years ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆26Aug 18, 2024Updated last year
- A C# project that builds a Web Application which redirects all HTTPS☆26Feb 11, 2025Updated last year
- Polymorphic ELF Runtime Crypter written in rust.☆21Jan 21, 2021Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Aug 6, 2018Updated 7 years ago
- e(X)tensiable (Rust) Malware Toolkit: (Soon!) Full Featured Rust C2 Framework with Awesome Features!☆27Aug 19, 2024Updated last year
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- ☆27Jul 5, 2023Updated 2 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆63Oct 16, 2024Updated last year
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆36Jul 22, 2021Updated 4 years ago
- Some of my custom "tools".☆28Feb 21, 2022Updated 3 years ago
- PHP Script intdended to be used during Phishing campaigns as a credentials collector linked to backdoored HTML <form> action parameter☆61Oct 24, 2021Updated 4 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆32Nov 12, 2025Updated 3 months ago