redeflesq / firewall-bypassLinks
PoC for downloading data by injecting into processes to evade firewalls
☆36Updated last year
Alternatives and similar repositories for firewall-bypass
Users that are interested in firewall-bypass are comparing it to the libraries listed below
Sorting:
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆15Updated last year
- ManageEngine ADManager Command Injection☆11Updated last year
- ☆29Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated last year
- Beacon Object Files used for Cobalt Strike☆19Updated 2 years ago
- ☆19Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- Global Protec Palo Alto File Write Exploit☆9Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated 2 years ago
- Python3 tool to perform password spraying using RDP☆17Updated last year
- Use WordPress pingback.ping to transfer files.☆17Updated last year
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆54Updated 2 years ago
- A simple rpc2socks alternative in pure Go.☆29Updated last year
- Tool for obtaining information about PPL processes☆17Updated last year
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆21Updated last year
- Right-To-Left Override POC☆35Updated 3 years ago
- various python scripts☆15Updated 4 years ago
- A proof-of-concept created for academic/learning purposes, demonstrating both local and remote use of VSTO "Add-In's" maliciously☆31Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- ☆12Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated 2 years ago
- ☆59Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆43Updated last year
- ☆22Updated 2 years ago
- Just another Process Injection using Process Hollowing technique.☆18Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated 10 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆38Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆34Updated 2 years ago