redeflesq / firewall-bypass
Download data from the internet bypassing the firewall using process injection
☆36Updated last year
Alternatives and similar repositories for firewall-bypass:
Users that are interested in firewall-bypass are comparing it to the libraries listed below
- A utility that can be used to launch an executable with a DLL injected☆18Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated last year
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆23Updated 4 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆41Updated 7 months ago
- ☆11Updated 7 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- Dump Linux keyrings☆17Updated 8 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- OSED Practice binary☆24Updated last year
- ☆28Updated last year
- Tomcat backdoor based on CS blog☆27Updated last year
- Docker container for running CobaltStrike 4.10☆36Updated 5 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆26Updated 8 months ago
- ☆13Updated 3 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆30Updated last year
- ADSI based SA tool☆17Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated last year
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆35Updated 10 months ago
- Analyzes AdminSDHolder permissions & compares with a previous run, to detect potential backdoor/excessive persistent permission(s)☆14Updated last year
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- A console obfuscator for .NET assemblies.☆10Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆30Updated last year
- ☆14Updated 7 months ago
- ☆18Updated 2 months ago
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆23Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated last year