netspooky / kimagure
☆44Updated 3 years ago
Alternatives and similar repositories for kimagure:
Users that are interested in kimagure are comparing it to the libraries listed below
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 3 years ago
- Keep it secret, keep it safe☆77Updated 2 months ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 3 years ago
- ☆68Updated 4 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆72Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆66Updated 9 months ago
- QuoteDB (Vulnerable TCP Server)☆70Updated last year
- Offensive tool to trigger network authentications as SYSTEM☆141Updated 3 years ago
- Hookers are cooler than patches.☆170Updated 3 years ago
- Dump objects from .NET dumps.☆50Updated 3 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆122Updated 3 years ago
- ☆121Updated last year
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆90Updated 11 months ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 2 years ago
- WNF Code Execution Library Using C#☆110Updated 4 years ago
- Python based WinDbg script to automate the search for code caves in binaries and libraries.☆47Updated 3 months ago
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- Dump stuff without touching disk☆162Updated 4 years ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆118Updated 10 months ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- ☆66Updated last month
- [S]imple [T]actical [A]gent [R]elay: A peer-to-peer C2-ish framework for Ethical Hackers and Security Researchers.☆31Updated 3 years ago
- ☆88Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago
- ☆113Updated 2 years ago
- Windbg Readable & Dark Green Theme - Own Use☆44Updated 6 years ago
- ☆90Updated 2 months ago