netspooky / kimagureLinks
☆44Updated 4 years ago
Alternatives and similar repositories for kimagure
Users that are interested in kimagure are comparing it to the libraries listed below
Sorting:
- A tool to tunnel TCP traffic over WinRM☆18Updated 4 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 5 years ago
- Managed code hooking template.☆108Updated 4 years ago
- Red Team Operator: Malware Development Essentials Course☆100Updated 5 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆53Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆102Updated 2 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆230Updated 4 years ago
- Bypassing AppLocker with C#☆143Updated 4 years ago
- WNF Code Execution Library Using C#☆111Updated 5 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆199Updated 3 months ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 4 years ago
- ☆101Updated last year
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- Dll that can be used for side loading and other attack vector.☆203Updated 5 years ago
- Dump stuff without touching disk☆164Updated 5 years ago
- code for the Proxy DLL example blog post☆62Updated 4 years ago
- ☆112Updated 2 years ago
- Hookers are cooler than patches.☆170Updated 3 years ago
- ☆209Updated 3 years ago
- Simple AV Evasion for PE Files☆42Updated 4 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆144Updated 4 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 4 years ago
- Keep it secret, keep it safe☆79Updated 9 months ago
- Sustainable shellcode evasion☆112Updated 11 months ago
- LD_PRELOAD rootkit☆138Updated last year
- ☆122Updated 2 years ago