wetw0rk / Sickle
Payload Development Framework
☆741Updated this week
Alternatives and similar repositories for Sickle:
Users that are interested in Sickle are comparing it to the libraries listed below
- Token Privilege Research☆815Updated 7 years ago
- Tool for extracting information from newly spawned processes☆753Updated 3 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆748Updated 6 years ago
- fireELF - Fileless Linux Malware Framework☆668Updated 6 years ago
- Interactive shellcoding environment to easily craft shellcodes☆897Updated 4 years ago
- kernel privilege escalation enumeration and exploitation framework☆690Updated 6 years ago
- A handy collection of my public exploits, all in one place.☆607Updated 2 weeks ago
- A shellcode writing toolkit☆670Updated 3 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆746Updated last year
- Red Team Tips as posted by @vysecurity on Twitter☆1,061Updated 5 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,606Updated 6 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,127Updated 4 years ago
- HTA encryption tool for RedTeams☆1,394Updated 2 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆443Updated 3 weeks ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆919Updated 3 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆209Updated 2 years ago
- ☆485Updated 7 years ago
- A collection of links related to VMware escape exploits☆1,418Updated 8 months ago
- ☆1,150Updated 8 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆575Updated 10 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆976Updated 7 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,106Updated 7 years ago
- ☆609Updated 2 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated 10 months ago
- Modern tactical exploitation toolkit.☆847Updated 9 months ago
- Vulnerability Labs for security analysis☆1,170Updated 4 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆575Updated 10 months ago
- Public repository for windbglib, a wrapper around pykd.pyd (for Windbg), used by mona.py☆327Updated 2 years ago
- The Damn Vulnerable Router Firmware Project☆687Updated 4 years ago