mxrch / evilize
Use md5-collisions to make evil executables looking like a good one.
☆29Updated 5 years ago
Alternatives and similar repositories for evilize:
Users that are interested in evilize are comparing it to the libraries listed below
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- ☆12Updated 4 years ago
- ☆27Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- ☆18Updated last year
- ☆17Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Zoom Persistence Aggressor and Handler☆55Updated 4 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- A mini project to exfiltrate data via QR codes☆19Updated 3 weeks ago
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 4 years ago
- Basic Dart reverse shell code☆21Updated last year
- A collection of my presentation materials.☆17Updated last year
- Some of my custom "tools".☆23Updated 3 years ago
- ☆18Updated 4 years ago
- ☆11Updated 4 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆19Updated last month
- wordlists for password cracking☆27Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- Ansible role to deploy RedELK server☆18Updated last year
- Red team oriented key finder and correlator☆16Updated last year
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆37Updated 5 years ago
- Right-To-Left Override POC☆34Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Working repo used to experiment with various languages as it relates to offensive security & evasion.☆31Updated 10 months ago