reveng007 / Executable_Files
Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for further usage of C2 as well
☆11Updated 2 months ago
Alternatives and similar repositories for Executable_Files:
Users that are interested in Executable_Files are comparing it to the libraries listed below
- ☆12Updated last week
- ☆10Updated 2 months ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- ☆12Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- ☆21Updated last year
- A Python script to find tenant id an region from a list of domain names.☆12Updated last year
- ☆11Updated last year
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆18Updated 2 years ago
- Leverages B64 chunks to split files and save to clipboard☆25Updated 7 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 6 months ago
- Python3 tool to perform password spraying using RDP☆16Updated last year
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆15Updated last year
- A simple website to act as a store for havoc modules and extensions☆24Updated last month
- Cobalt Strike notifications via NTFY.☆13Updated 3 months ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆28Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Updated 10 months ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated 9 months ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 6 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 9 months ago
- A simple Nim stager (w/ fiber execution)☆16Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 3 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆10Updated 2 years ago
- Just another Process Injection using Process Hollowing technique.☆16Updated last year