Ping Exfiltration Command and Control (PiX-C2)
☆32May 15, 2015Updated 10 years ago
Alternatives and similar repositories for PiX-C2
Users that are interested in PiX-C2 are comparing it to the libraries listed below
Sorting:
- This is a patched version of ExchangeRelayX☆14Aug 13, 2020Updated 5 years ago
- ☆13Aug 13, 2019Updated 6 years ago
- Memory tracer, leaks hunter.☆19Sep 5, 2018Updated 7 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Proofs-Of-360Security Sandbox Escape☆10Mar 18, 2022Updated 3 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- A tool for Windows that can make any program work within file-system transactions.☆59Nov 12, 2020Updated 5 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆32Nov 17, 2019Updated 6 years ago
- SamrSearch can get user info and group info with MS-SAMR.☆15Feb 15, 2022Updated 4 years ago
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- ☆25Apr 30, 2021Updated 4 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Oct 7, 2020Updated 5 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆13Oct 13, 2023Updated 2 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- ☆12Aug 29, 2025Updated 6 months ago
- ☆13Jan 21, 2019Updated 7 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- Microsoft Office 365 EWS (Exchange Web Services) Client Library☆10Jan 7, 2015Updated 11 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Get your data from the resource section manually, with no need for windows apis☆67Oct 22, 2024Updated last year
- BOF/COFF obj file to PIC(shellcode). by golang☆39Sep 28, 2022Updated 3 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆37Jul 27, 2021Updated 4 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- (CNVD-2021-26422)亿邮电子邮件系统 远程命令执行漏洞☆12Apr 28, 2021Updated 4 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Outlook addin Back Door☆11Dec 2, 2015Updated 10 years ago
- ☆16Dec 20, 2021Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆13Nov 4, 2018Updated 7 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 4 years ago
- 自己写的Alfred插件,包含时间转换/编解码/hash/ip查询等常用功能☆13Sep 2, 2022Updated 3 years ago
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- VBS Reversed TCP Meterpreter Stager☆88May 25, 2017Updated 8 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆30Jul 12, 2021Updated 4 years ago
- ☆23Oct 29, 2019Updated 6 years ago
- SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and s…☆63Sep 2, 2020Updated 5 years ago