trickster0 / LenumLinks
Linux Enumeration / Privilege escalation tool
☆26Updated 5 years ago
Alternatives and similar repositories for Lenum
Users that are interested in Lenum are comparing it to the libraries listed below
Sorting:
- Rust in-memory dumper☆108Updated 2 years ago
- ☆86Updated 3 years ago
- A Rust-based dropper for shellcode payloads.☆72Updated 10 months ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Updated last year
- Massayo is a small proof-of-concept Rust library which removes AV/EDR hooks in a given system DLL☆64Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 3 years ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆115Updated 2 years ago
- Rusty Impersonate☆106Updated 3 months ago
- ☆120Updated 2 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆42Updated 10 months ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Artifact monitoring that ensures fairplay☆79Updated last year
- Just some Rust process injector POCs, nothing weird.☆81Updated 3 years ago
- An open-source process injection enumeration tool written in C#☆175Updated 3 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆52Updated 2 years ago
- EDR Detector that can find what kind of endpoint solution is being used according to drivers in the system.☆93Updated 4 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Updated 2 years ago
- ☆133Updated 2 years ago
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆96Updated 2 years ago
- Using fibers to run in-memory code.☆240Updated 2 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- rcat☆75Updated 3 years ago
- ☆75Updated 10 months ago
- Collection of random RedTeam scripts.☆211Updated last year
- random code snippets, useful for getting started☆123Updated 2 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago
- Hide memory artifacts using ROP and hardware breakpoints.☆147Updated 2 years ago