A malicious KeePass plugin to exfiltrate the master key.
☆15Oct 25, 2021Updated 4 years ago
Alternatives and similar repositories for Malicious-KeePass-Plugin
Users that are interested in Malicious-KeePass-Plugin are comparing it to the libraries listed below
Sorting:
- ☆22Aug 11, 2021Updated 4 years ago
- scripts to setup servers, as quickly as possible☆10Updated this week
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- a dkom rootkit that targets windows x64 systems. the rootkit hooks and edits criticl memory sections in order to hide different resources…☆18Jul 5, 2023Updated 2 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- A collection of anti-cheat ideas☆17Sep 12, 2020Updated 5 years ago
- C Header Only Library for Virii☆11Nov 17, 2020Updated 5 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆28Mar 11, 2020Updated 5 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- ☆28Dec 16, 2023Updated 2 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- Things i do because i saw it on twitter on a weekend☆57Jul 20, 2025Updated 7 months ago
- Simple Python tool to crack VirtualBox Disk Image Encryption passwords☆28Sep 28, 2018Updated 7 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Nov 14, 2020Updated 5 years ago
- CreateRemoteThreadPlus: how to pass multiple parameters to the remote thread function without shellcode.☆138Jul 10, 2025Updated 7 months ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Shim database persistence (Fin7 TTP)☆37Feb 25, 2020Updated 6 years ago
- WhatsCloud is an android app which allows you to analyze your WhatsApp chat history on the fly with only one click☆12Jul 29, 2019Updated 6 years ago
- Another meterpreter injection technique using C# that attempts to bypass Defender☆265Oct 20, 2021Updated 4 years ago
- ☆92Aug 23, 2021Updated 4 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆41Sep 23, 2021Updated 4 years ago
- Example/starter code for custom Windows application compatibility shims☆38Dec 27, 2020Updated 5 years ago
- Outlook persistence using VSTO add-ins☆87Jan 9, 2021Updated 5 years ago
- A quick example of the Hells Gate technique in Nim☆94Aug 11, 2021Updated 4 years ago
- ☆10Feb 11, 2025Updated last year
- Grub Theme☆12Aug 29, 2022Updated 3 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆12May 30, 2024Updated last year
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Blockchain Reader Library☆10Jan 20, 2024Updated 2 years ago
- Virtual Audio Loopback Cable for Windows☆10Sep 18, 2022Updated 3 years ago