trickster0 / LenumLinks
Linux Enumeration / Privilege escalation tool
☆23Updated 4 years ago
Alternatives and similar repositories for Lenum
Users that are interested in Lenum are comparing it to the libraries listed below
Sorting:
- A Rust-based dropper for shellcode payloads.☆66Updated 3 months ago
- ☆85Updated 2 years ago
- Rust in-memory dumper☆108Updated last year
- Just some Rust process injector POCs, nothing weird.☆80Updated 3 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago
- ☆119Updated last year
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆94Updated 3 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆103Updated last year
- Massayo is a small proof-of-concept Rust library which removes AV/EDR hooks in a given system DLL☆65Updated 2 years ago
- random code snippets, useful for getting started☆121Updated 8 months ago
- Simple tool to perform HTML Smuggling.☆68Updated 3 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆157Updated last year
- The most average C2 ever (MACE)☆96Updated 3 years ago
- Using fibers to run in-memory code.☆212Updated last year
- A prototype malware C2 channel using x509 certificates over mTLS☆153Updated last year
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆98Updated 3 months ago
- Hide memory artifacts using ROP and hardware breakpoints.☆146Updated last year
- ☆107Updated 2 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Updated last year
- Red Team "Drop and Run" NAC (802.1x) Bypass☆74Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆82Updated last year
- Finding secrets in kernel and user memory☆116Updated last year
- (Demo) 3rd party agent for Havoc☆140Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- C2 Automation using Linode☆82Updated 2 years ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆133Updated 2 years ago
- POC for frustrating/defeating Malware Analysts☆156Updated 3 years ago