redr0nin / Signal-DLL-HijackingLinks
DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.
☆14Updated 8 months ago
Alternatives and similar repositories for Signal-DLL-Hijacking
Users that are interested in Signal-DLL-Hijacking are comparing it to the libraries listed below
Sorting:
- A small red team course☆39Updated 2 years ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 8 months ago
- Linux CS bypass technique☆33Updated 8 months ago
- ☆28Updated 2 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated 2 years ago
- ☆41Updated 2 years ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆55Updated 10 months ago
- ☆51Updated 11 months ago
- Deploy a phishing infrastructure on the fly.☆75Updated 9 months ago
- Docker container for running CobaltStrike 4.10☆37Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- Payload Generation Workflow☆40Updated 2 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 10 months ago
- ☆36Updated 4 months ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- ☆26Updated 7 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆38Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 7 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Docker container for running CobaltStrike 4.7 and above☆22Updated 6 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Situational Awareness script to identify how and where to run implants☆65Updated 10 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 6 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆42Updated 8 months ago
- Enumerate the Domain for Readable and Writable Shares☆22Updated 7 months ago
- IAT Unhooking proof-of-concept☆30Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- ☆52Updated 2 years ago
- Discord C2 Profile for Mythic☆32Updated 7 months ago