plackyhacker / Malicious-KeePass-Plugin
A malicious KeePass plugin to exfiltrate the master key.
☆14Updated 3 years ago
Alternatives and similar repositories for Malicious-KeePass-Plugin:
Users that are interested in Malicious-KeePass-Plugin are comparing it to the libraries listed below
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆35Updated 3 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 3 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 10 months ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆30Updated 3 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 4 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 3 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆58Updated 3 years ago
- Some of my custom "tools".☆23Updated 3 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Updated 4 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Updated 4 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Updated last year
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆29Updated 5 years ago
- Remove API hooks from a Beacon process.☆14Updated 3 years ago
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- Threadless Injection Payload Toolkit☆12Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Updated 3 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆29Updated last year
- ☆25Updated 3 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Python3 tool to perform password spraying using RDP☆16Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆18Updated 2 years ago
- ☆28Updated 4 years ago
- Bunch of BOF files☆30Updated 4 months ago
- ☆48Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago