n1nj4sec / pymemimporter
import pyd or execute PE all from memory using only pure python code and some shellcode tricks
☆73Updated 7 years ago
Alternatives and similar repositories for pymemimporter:
Users that are interested in pymemimporter are comparing it to the libraries listed below
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆110Updated 3 years ago
- A sample bot for Cobalt Strike 3☆22Updated 8 years ago
- ☆43Updated 5 years ago
- Executables that execute other stuff☆52Updated 6 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆133Updated 7 years ago
- few months old but better than nothing☆58Updated 2 years ago
- VBA Reversed TCP Meterpreter Stager☆62Updated 6 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆75Updated 6 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- Hollow Process / Dynamic Forking / RunPE injection technique implemented in Python☆53Updated 3 years ago
- ☆108Updated 6 years ago
- ☆84Updated 9 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆87Updated 5 years ago
- Collection of IronPython scripts and executables for penetration testing☆55Updated 5 years ago
- POSHSPY backdoor code☆43Updated 7 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆113Updated 4 years ago
- A "tiny" meterpreter stager☆126Updated 5 years ago
- VBS Reversed TCP Meterpreter Stager☆86Updated 7 years ago
- Ansible playbooks to facilitate redteam stuff☆14Updated 8 years ago
- Shim database persistence (Fin7 TTP)☆36Updated 4 years ago
- ☆75Updated 6 years ago
- ☆92Updated 6 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆130Updated 11 years ago
- Collection of scripts, binaries and the like to aid in WhiteList Evasion on a Microsoft Windows Network.☆129Updated 9 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆52Updated 6 years ago
- PoC dlls for Task Scheduler COM Hijacking☆90Updated 8 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆64Updated 7 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆61Updated 6 years ago
- medium-rare☆28Updated 5 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 6 years ago