Simple AV Evasion for PE Files
☆41Nov 21, 2021Updated 4 years ago
Alternatives and similar repositories for morbol
Users that are interested in morbol are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆33Nov 12, 2022Updated 3 years ago
- A small reverse shell for Linux & Windows☆619Jun 5, 2024Updated last year
- generate payloads that force authentication against an attacker machine☆120Nov 6, 2022Updated 3 years ago
- CLI monitor for windows process- & file activity☆97Nov 20, 2020Updated 5 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆15Feb 13, 2024Updated 2 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- 🌯 Give me a web shell, I'll give you a terminal.☆197Dec 29, 2021Updated 4 years ago
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Jan 15, 2016Updated 10 years ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 2 months ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆36Dec 23, 2019Updated 6 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆182Aug 4, 2021Updated 4 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 10 months ago
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- Random Powershell scripts☆13Feb 13, 2024Updated 2 years ago
- ☆43Dec 24, 2025Updated 2 months ago
- ☆20Dec 7, 2021Updated 4 years ago
- python spraying tools based on impacket lib☆55Sep 6, 2022Updated 3 years ago
- Get SYSTEM via SeDebugPrivilege☆24Jun 6, 2022Updated 3 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- Spring Framework RCE (Quick pentest notes)☆17Apr 7, 2022Updated 3 years ago
- SIP protocol command line sniffer☆13Apr 16, 2020Updated 5 years ago
- Bake shellcode to get malicious.exe☆27Jul 25, 2023Updated 2 years ago
- CLI tool to interact with the BloodHound CE API☆69Mar 6, 2026Updated 2 weeks ago
- https://exploit.courses/☆19Apr 14, 2018Updated 7 years ago
- Impersonating authentication over HTTP and/or named pipes.☆144Apr 2, 2021Updated 4 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 5 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 5 years ago
- ☆28Jan 9, 2023Updated 3 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Nov 25, 2022Updated 3 years ago
- ☆29Oct 18, 2022Updated 3 years ago
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- ☆409Updated this week
- AV Evasion, a Red Team Tool - Fiber, APC, PNG and UUID☆21Sep 7, 2021Updated 4 years ago