netspooky / kimagure
☆44Updated 3 years ago
Alternatives and similar repositories for kimagure:
Users that are interested in kimagure are comparing it to the libraries listed below
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year
- ☆68Updated 4 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 7 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- A tool to tunnel TCP traffic over WinRM☆17Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 3 years ago
- Hookers are cooler than patches.☆168Updated 3 years ago
- ☆94Updated 4 months ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆128Updated last year
- QuoteDB (Vulnerable TCP Server)☆63Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆82Updated 2 years ago
- ☆120Updated last year
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆85Updated 9 months ago
- ☆111Updated last year
- WNF Code Execution Library Using C#☆108Updated 4 years ago
- A small utility to translate NTDS.dit files to SQLite format.☆68Updated last year
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆115Updated 8 months ago
- Red Team Operator: Malware Development Essentials Course☆98Updated 4 years ago
- Keep it secret, keep it safe☆77Updated 2 weeks ago
- ☆187Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 3 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆31Updated 2 years ago
- code for the Proxy DLL example blog post☆60Updated 3 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago