mxrch / evilizeLinks
Use md5-collisions to make evil executables looking like a good one.
☆30Updated 5 years ago
Alternatives and similar repositories for evilize
Users that are interested in evilize are comparing it to the libraries listed below
Sorting:
- A fast wordlist to nthash converter☆21Updated 3 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆26Updated 2 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆33Updated 3 years ago
- AMSI detection PoC☆32Updated 5 years ago
- A collection of my presentation materials.☆17Updated last year
- Ingest openldap data into bloodhound☆81Updated 4 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 4 years ago
- wordlists for password cracking☆28Updated 3 years ago
- c# reverse shell poc☆27Updated 6 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Updated 4 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Updated 4 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 5 years ago
- Dumping credentials through windbg and pykd☆41Updated last year
- ☆18Updated 4 years ago
- A mini project to exfiltrate data via QR codes☆19Updated last month
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Updated 5 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- Basic Dart reverse shell code☆21Updated last year
- Zoom Persistence Aggressor and Handler☆55Updated 4 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated 2 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- Right-To-Left Override POC☆36Updated 3 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated 2 years ago
- pwncat windows c2 components☆20Updated 4 years ago
- ☆36Updated 5 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆29Updated 6 years ago