rek7 / mXtractLinks
mXtract - Memory Extractor & Analyzer
☆593Updated 3 years ago
Alternatives and similar repositories for mXtract
Users that are interested in mXtract are comparing it to the libraries listed below
Sorting:
- fireELF - Fileless Linux Malware Framework☆667Updated 6 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 8 months ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆524Updated 3 years ago
- Modern tactical exploitation toolkit.☆850Updated 11 months ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆746Updated last year
- Payload Development Framework☆756Updated this week
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,130Updated 4 years ago
- A Golang implant that uses Slack as a command and control server☆462Updated 2 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆949Updated 6 years ago
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆647Updated 5 years ago
- A fully functional DanderSpritz lab in 2 commands☆428Updated 6 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆408Updated last year
- Bash post exploitation toolkit☆734Updated last year
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆546Updated 4 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆924Updated 4 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆469Updated 4 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,282Updated 3 years ago
- Tool for extracting information from newly spawned processes☆759Updated last month
- Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.☆642Updated 6 months ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆602Updated last year
- A memory scanning evasion technique☆872Updated 8 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆547Updated 8 months ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,374Updated 4 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆696Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,215Updated 4 years ago
- Demos of various injection techniques found in malware☆791Updated 3 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆537Updated 3 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆445Updated last month
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 2 years ago
- Interactive shellcoding environment to easily craft shellcodes☆895Updated 4 years ago