usiegl00 / tamatoa
If you have any questions, please open an issue.
☆24Updated 2 years ago
Alternatives and similar repositories for tamatoa:
Users that are interested in tamatoa are comparing it to the libraries listed below
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆13Updated 3 years ago
- ☆15Updated 3 years ago
- C# loader that copies a chunk at the time of the shellcode in memory, rather that all at once☆23Updated 2 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Updated 3 years ago
- PoC of macho loading from memory☆54Updated 4 months ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆46Updated 3 years ago
- Extended Process List (Search functionality)☆29Updated 4 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆60Updated 2 years ago
- aggressor and pycobalt scripts.☆18Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆43Updated last year
- all credits go to @mgeeky☆64Updated 3 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆34Updated 3 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆46Updated 4 years ago
- macOS shellcode loader written in Objective-C☆47Updated 2 years ago
- DoublePulsar (Position-Independent) Shellcode (Windows 7 SP1 x64)☆27Updated 5 years ago
- A little implant which SSH's back with a shell☆36Updated 3 years ago
- ☆37Updated 3 years ago
- Loads .NET Assembly Via CLR Loader☆16Updated 6 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Updated 3 years ago
- MiniDump a process in memory with rust☆36Updated 3 years ago
- Zoom Persistence Aggressor and Handler☆54Updated 3 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆27Updated last year
- Loads a program into a memfd and runs it.☆12Updated 2 years ago
- ☆36Updated 2 years ago