rek7 / mXtractLinks
mXtract - Memory Extractor & Analyzer
☆594Updated 3 years ago
Alternatives and similar repositories for mXtract
Users that are interested in mXtract are comparing it to the libraries listed below
Sorting:
- fireELF - Fileless Linux Malware Framework☆672Updated 6 years ago
- GTRS - Google Translator Reverse Shell☆616Updated 9 months ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆546Updated 4 years ago
- Modern tactical exploitation toolkit.☆848Updated last year
- Bash post exploitation toolkit☆737Updated 2 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆525Updated 4 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆949Updated 6 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Updated 3 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆747Updated last year
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆655Updated last year
- Stealthy backdoor for Windows operating systems☆281Updated 5 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆603Updated last year
- A Python Package for Data Exfiltration☆790Updated last month
- A fully functional DanderSpritz lab in 2 commands☆432Updated 6 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆647Updated 5 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆472Updated 4 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,382Updated 4 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,291Updated 3 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆412Updated 5 years ago
- Windows passwords decryption from dump files☆501Updated 2 years ago
- kernel privilege escalation enumeration and exploitation framework☆693Updated 7 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆407Updated last year
- Micro$oft Windows Hacking Pack☆522Updated 7 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Robber is open source tool for finding executables prone to DLL hijacking☆784Updated 3 years ago
- PowerShell ReverseTCP Shell - Framework☆1,056Updated 2 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆636Updated 2 years ago
- Data exfiltration over DNS request covert channel☆869Updated last year
- HTA encryption tool for RedTeams☆1,402Updated 2 years ago
- Payload Development Framework☆766Updated this week