skelsec / anfs
Asynchronous NFSv3 client in pure Python
☆22Updated 3 months ago
Related projects: ⓘ
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆18Updated 3 months ago
- An In-memory Embedding of CPython☆13Updated 3 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆17Updated last year
- Bunch of BOF files☆21Updated 7 months ago
- ☆27Updated 3 months ago
- A VSCode devcontainer for development of COFF files with batteries included.☆47Updated last year
- Shellcode reflective DLL injection in Rust☆18Updated 6 months ago
- string encryption in Nim☆16Updated 3 months ago
- Load and execute a common object file format (COFF) in the current process☆21Updated 6 months ago
- ☆47Updated last year
- Smuggle a file to a user's browser☆18Updated 2 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆24Updated 6 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated 6 months ago
- Attack chain emulator. Write recipes for initial access easily☆19Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆32Updated 10 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆37Updated 9 months ago
- Scripts to interact with Microsoft Graph APIs☆29Updated 2 months ago
- A work in progress BOF/COFF loader in Rust☆38Updated last year
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆4Updated 4 months ago
- Beacon Object Files (not Buffer Overflows)☆51Updated last year
- A VSCode plugin to assist with BOF development.☆29Updated last month
- ☆26Updated last year
- Determine if the WebClient Service (WebDAV) is running on a remote system☆15Updated 6 months ago
- Windows x64 Process Injection via Ghostwriting with Dynamic Configuration☆27Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆29Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated 10 months ago
- Linux Sleep Obfuscation☆87Updated 8 months ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated last year