mXtract - Memory Extractor & Analyzer
☆588Nov 9, 2021Updated 4 years ago
Alternatives and similar repositories for mXtract
Users that are interested in mXtract are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- fireELF - Fileless Linux Malware Framework☆680Apr 17, 2019Updated 6 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆317Mar 31, 2021Updated 4 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Red Team Tool Kit☆1,133Dec 8, 2022Updated 3 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- ☆128May 22, 2023Updated 2 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Feb 27, 2025Updated last year
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,418Oct 3, 2020Updated 5 years ago
- Robber is open source tool for finding executables prone to DLL hijacking☆786Jun 23, 2022Updated 3 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,310Aug 19, 2019Updated 6 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Jun 20, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,583Updated this week
- Linux Memory Cryptographic Keys Extractor☆242May 22, 2023Updated 2 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆680Oct 28, 2023Updated 2 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 7 years ago
- A function tracer☆92Jun 4, 2019Updated 6 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 7 years ago
- Automatic analysis of SWF files based on some heuristics. Extensible via plugins.☆119Jun 19, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆25May 9, 2021Updated 4 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,452Nov 20, 2025Updated 4 months ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- Script to steal passwords from ssh.☆489Dec 19, 2018Updated 7 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆281Nov 3, 2019Updated 6 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆742Mar 17, 2019Updated 7 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,558Oct 16, 2025Updated 5 months ago
- UAC bypass, Elevate, Persistence methods☆2,738Feb 13, 2023Updated 3 years ago
- Know the dangers of credential reuse attacks.☆2,103Dec 9, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- SMB Relay Attack Script☆146Dec 6, 2018Updated 7 years ago
- Pattern Extractor for Obfuscated Code☆302Feb 12, 2022Updated 4 years ago
- Windows Event Log Killer☆1,813Sep 21, 2023Updated 2 years ago
- Network Pivoting Toolkit☆458Aug 26, 2023Updated 2 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,330Dec 6, 2023Updated 2 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago