This is a simple example of DLL hijacking enabling proxy execution.
☆70Apr 18, 2023Updated 2 years ago
Alternatives and similar repositories for Discord-DLL-Hijacking
Users that are interested in Discord-DLL-Hijacking are comparing it to the libraries listed below
Sorting:
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Apr 13, 2023Updated 2 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Dec 26, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Jan 12, 2023Updated 3 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆145May 18, 2024Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago
- ☆300Jan 3, 2024Updated 2 years ago
- ☆20Mar 21, 2024Updated last year
- Weaponized HellsGate/SigFlip☆203Jun 7, 2023Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Jun 27, 2024Updated last year
- Packet crafting, injection and sniffing tool☆70Jan 8, 2026Updated last month
- DNS over HTTPS targeted malware (only runs once)☆96Aug 16, 2023Updated 2 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Jul 19, 2024Updated last year
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆91Dec 2, 2025Updated 2 months ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Shaco is a linux agent for havoc☆170Oct 25, 2023Updated 2 years ago
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆1,019Aug 29, 2023Updated 2 years ago
- Reasonably undetected shellcode stager and executer.☆36May 23, 2025Updated 9 months ago
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 2 years ago
- Modular framework to exploit UPS devices☆64Mar 1, 2023Updated 2 years ago
- ☆16Mar 26, 2024Updated last year
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆382Nov 2, 2023Updated 2 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- ☆17Jun 14, 2023Updated 2 years ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- ☆26Mar 10, 2022Updated 3 years ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 4 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago