netspooky / kimagureLinks
☆44Updated 4 years ago
Alternatives and similar repositories for kimagure
Users that are interested in kimagure are comparing it to the libraries listed below
Sorting:
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 4 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆53Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆74Updated last year
- ☆47Updated 2 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆33Updated 3 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- Offensive tool to trigger network authentications as SYSTEM☆142Updated 3 years ago
- Smart Card PIN swiping DLL☆78Updated 4 years ago
- Managed code hooking template.☆108Updated 4 years ago
- ☆112Updated last year
- ☆19Updated 3 years ago
- Hookers are cooler than patches.☆169Updated 3 years ago
- WNF Code Execution Library Using C#☆111Updated 5 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Updated 4 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆71Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆95Updated last year
- ☆100Updated 9 months ago
- code for the Proxy DLL example blog post☆61Updated 3 years ago
- CyberSec Blog☆95Updated 2 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆133Updated last year
- Random☆34Updated 2 years ago
- ☆68Updated 2 years ago