wetw0rk / Sickle
Payload development framework
☆701Updated this week
Alternatives and similar repositories for Sickle:
Users that are interested in Sickle are comparing it to the libraries listed below
- Token Privilege Research☆801Updated 7 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆743Updated 6 years ago
- kernel privilege escalation enumeration and exploitation framework☆689Updated 6 years ago
- Tool for extracting information from newly spawned processes☆745Updated 3 years ago
- A shellcode writing toolkit☆661Updated 2 years ago
- Interactive shellcoding environment to easily craft shellcodes☆892Updated 3 years ago
- Public repository for windbglib, a wrapper around pykd.pyd (for Windbg), used by mona.py☆325Updated 2 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆912Updated 3 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated 7 months ago
- A memory scanning evasion technique☆855Updated 7 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,050Updated 4 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆744Updated last year
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,124Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆679Updated 3 years ago
- HTA encryption tool for RedTeams☆1,381Updated 2 years ago
- socks4 reverse proxy for penetration testing☆580Updated 6 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆568Updated 10 years ago
- PowerShell module to check if a Windows binary (EXE/DLL) has been compiled with ASLR, DEP, SafeSEH, StrongNaming, and Authenticode.☆631Updated 6 months ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Updated 7 years ago
- fireELF - Fileless Linux Malware Framework☆661Updated 5 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆208Updated 2 years ago
- Post Exploitation Wiki☆515Updated 5 years ago
- All my infosec notes I have been building up over the years☆330Updated this week
- A tool to create a JScript file which loads a .NET v2 assembly from memory.☆1,264Updated 4 years ago
- ☆763Updated 2 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,207Updated 4 years ago
- Powershell C2 Server and Implants☆574Updated 5 years ago
- Vulnerability examples.☆402Updated 9 months ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆258Updated 3 years ago
- ☆1,138Updated 7 years ago