rek7 / mXtractLinks
mXtract - Memory Extractor & Analyzer
☆591Updated 4 years ago
Alternatives and similar repositories for mXtract
Users that are interested in mXtract are comparing it to the libraries listed below
Sorting:
- Bash post exploitation toolkit☆744Updated 2 years ago
- GTRS - Google Translator Reverse Shell☆623Updated 2 months ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- fireELF - Fileless Linux Malware Framework☆677Updated 6 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948Updated 6 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆527Updated 4 years ago
- A fully functional DanderSpritz lab in 2 commands☆445Updated 6 years ago
- Modern tactical exploitation toolkit.☆852Updated last month
- Windows passwords decryption from dump files☆511Updated 2 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆655Updated last year
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆745Updated 2 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆619Updated 2 months ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆476Updated 4 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,301Updated 3 years ago
- Stealthy backdoor for Windows operating systems☆283Updated 5 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,215Updated 5 years ago
- Interactive shellcoding environment to easily craft shellcodes☆903Updated 4 years ago
- Red Team Tool Kit☆1,128Updated 3 years ago
- A Golang implant that uses Slack as a command and control server☆463Updated 2 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,440Updated 3 weeks ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆647Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,114Updated 8 years ago
- HTA encryption tool for RedTeams☆1,417Updated 3 years ago
- Data exfiltration over DNS request covert channel☆877Updated last year
- Orc is a post-exploitation framework for Linux written in Bash☆399Updated 6 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆405Updated last year
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆413Updated 5 years ago
- Payload Development Framework☆821Updated last month
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆637Updated 2 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Updated 3 years ago