nyxgeek / dirdevil
hiding in plain sight: part 2
☆40Updated 2 months ago
Related projects: ⓘ
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆77Updated 7 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆41Updated last year
- ☆50Updated 5 months ago
- C++ Code to perform a MiniDump of lsass.exe☆33Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆25Updated 6 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆55Updated 5 months ago
- A PoC for achieving persistence via push notifications on Windows☆43Updated last year
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆30Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆37Updated 2 years ago
- ☆35Updated 9 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆34Updated last week
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆42Updated last year
- Extension functionality for the NightHawk operator client☆26Updated 10 months ago
- exfiltration/infiltration toolkit☆23Updated 9 months ago
- ☆42Updated this week
- ECC Public Key Cryptography☆33Updated 10 months ago
- Discord C2 Profile for Mythic☆23Updated 5 months ago
- ☆11Updated 8 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆39Updated last year
- XOR-based shellcode encoder☆31Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- ☆38Updated last year
- Reasonably undetected shellcode stager and executer.☆34Updated last week
- Source code and examples for PassiveAggression☆54Updated 3 months ago
- Unfixed Windows PowerShell Filename Code Execution POC☆40Updated 8 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆15Updated 8 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆60Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆50Updated last year
- Proof of Concept for CVE-2023-23397 in Python☆27Updated last year