safebuffer / edge-hot-deliveryLinks
edge --> powerpoint --> remote-file --> shell
☆12Updated 6 years ago
Alternatives and similar repositories for edge-hot-delivery
Users that are interested in edge-hot-delivery are comparing it to the libraries listed below
Sorting:
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Random stuff☆16Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- ☆17Updated 7 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆14Updated 8 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- ☆40Updated 7 years ago
- Red Team C2 and Post Exploitation code☆36Updated 3 months ago
- Several self-defense shellcodes☆23Updated 6 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Updated 6 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 6 years ago
- "Polymorphic" shellcode generator (x86)☆25Updated 11 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- Handy script to automate the attack☆22Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆18Updated 5 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30Updated 4 years ago
- ☆22Updated 5 years ago
- Raw syscall implementations with Powershell☆29Updated 6 years ago
- ☆43Updated 6 years ago