s0lst1c3 / dropengine
DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and combine them to create highly sophisticated payloads within seconds.
☆212Updated 4 years ago
Alternatives and similar repositories for dropengine:
Users that are interested in dropengine are comparing it to the libraries listed below
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆415Updated 2 years ago
- ☆260Updated 2 years ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆229Updated 4 years ago
- lateral movement techniques that can be used during red team exercises☆271Updated 5 years ago
- A modular C2 framework☆455Updated last week
- D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife - Lateral movement using DCOM Objects☆208Updated 4 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆422Updated 2 years ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆138Updated 4 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Updated last year
- Dll that can be used for side loading and other attack vector.☆202Updated 4 years ago
- DLL Generator for side loading attack☆171Updated 6 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆346Updated 4 years ago
- This is a PowerShell Empire launcher PoC using PrintDemon and Faxhell.☆201Updated 4 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆142Updated 3 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆240Updated 4 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 3 years ago
- ☆162Updated 2 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆249Updated 4 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆381Updated 4 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆252Updated last year
- Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.☆255Updated 3 years ago
- A tool to create obfuscated HTA script.☆176Updated 3 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆517Updated 2 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆509Updated 4 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆215Updated 2 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆245Updated 4 years ago
- ☆253Updated 6 years ago
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆523Updated 3 years ago
- A framework for stealthy domain reconnaissance☆302Updated 3 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago