mgrube / JavaProcessInjectLinks
Demo
☆24Updated 5 years ago
Alternatives and similar repositories for JavaProcessInject
Users that are interested in JavaProcessInject are comparing it to the libraries listed below
Sorting:
- ☆301Updated last year
- Offensive Lua.☆221Updated 2 months ago
- Retired TrustedSec Capabilities☆248Updated last month
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Just some random Red Team Scripts that can be useful☆154Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- ☆166Updated 7 months ago
- ☆160Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆318Updated this week
- ☆189Updated 2 years ago
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- ☆120Updated 2 years ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆66Updated last year
- ☆133Updated 2 years ago
- Python utility that generates "imageless" QR codes in various formats☆136Updated last year
- Malware As A Service☆137Updated last year
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- ☆138Updated 2 years ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆319Updated 2 years ago
- ☆230Updated 7 months ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆137Updated 2 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆195Updated 11 months ago
- A prototype malware C2 channel using x509 certificates over mTLS☆152Updated last year
- A collection of tools, scripts and personal research☆155Updated this week
- Direct access to NTFS volumes☆292Updated 4 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆107Updated 2 years ago
- Collection of random RedTeam scripts.☆211Updated last year