thomaskeck / PyShellCode
Execute ShellCode / "Inline-Assembler" in Python
☆39Updated 7 years ago
Related projects: ⓘ
- ☆52Updated 4 years ago
- Use powershell to test Office-based persistence methods☆76Updated 3 years ago
- sploit☆67Updated 4 years ago
- Apache Module Backdoor (PoC)☆47Updated 5 years ago
- Python api for usage with cobalt strike's External C2 specification☆61Updated 5 years ago
- Windows Stagers to circumvent restrictive network environments☆63Updated last year
- ☆93Updated 5 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 5 years ago
- F# Implementation to spawn shellcode☆47Updated 6 years ago
- few months old but better than nothing☆58Updated 2 years ago
- ☆33Updated this week
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆58Updated 5 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆119Updated 4 years ago
- ☆57Updated this week
- POC for Cobalt Strike external C2☆121Updated 3 years ago
- Python api for usage with cobalt strike's External C2 specification☆66Updated 6 years ago
- ☆86Updated this week
- ☆56Updated this week
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆34Updated 5 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆84Updated 5 years ago
- initial commit☆42Updated 7 years ago
- with metasploit☆62Updated 4 years ago
- ☆51Updated 5 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆52Updated 5 years ago
- Community maintained list of most popular HIPS service and process names on a Windows Platform.☆43Updated 2 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆14Updated 4 years ago
- ☆24Updated 3 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆73Updated 4 years ago
- ☆53Updated 5 years ago
- ☆76Updated this week
- ☆44Updated 4 years ago