vyrus001 / needleLinks
Shellcode process injector
☆27Updated 5 years ago
Alternatives and similar repositories for needle
Users that are interested in needle are comparing it to the libraries listed below
Sorting:
- ☆33Updated 4 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- post exploitation user monitoring tool☆20Updated 6 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 months ago
- Offensive go lang series☆32Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- PoC Remote Administration Tool☆11Updated 5 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- various slides and presentations I've worked on☆19Updated 2 months ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- ☆24Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Network Finger Printer☆16Updated 7 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Updated 5 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- Enumerate all network shares in the current domain. Also, can resolve names to IP addresses.☆7Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆36Updated 4 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 6 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- CVE-2020-0688 PoC☆11Updated 6 months ago