p4p1 / havoc-store
A simple website to act as a store for havoc modules and extensions
☆26Updated 3 months ago
Alternatives and similar repositories for havoc-store:
Users that are interested in havoc-store are comparing it to the libraries listed below
- A simple rpc2socks alternative in pure Go.☆28Updated 10 months ago
- Tool to aid in dumping LSASS process remotely☆38Updated 9 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆32Updated last year
- BOF for C2 framework☆41Updated 5 months ago
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆41Updated 9 months ago
- Just another Process Injection using Process Hollowing technique.☆17Updated last year
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆21Updated last year
- Bunch of BOF files☆30Updated 4 months ago
- Beacon Object Files (BOF) for Cobalt Strike.☆29Updated 8 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- Rewrite to fit my needs☆27Updated 9 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 7 months ago
- ☆20Updated 10 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- ☆18Updated 4 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆20Updated last month
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- ☆55Updated 6 months ago
- ☆40Updated this week
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆35Updated 7 months ago
- ☆13Updated 4 months ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆14Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- ☆17Updated 7 months ago