yoda66 / GoShellcodeLinks
☆71Updated 3 years ago
Alternatives and similar repositories for GoShellcode
Users that are interested in GoShellcode are comparing it to the libraries listed below
Sorting:
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- easy-to-use payload hosting☆274Updated 3 years ago
- ☆112Updated 2 years ago
- ☆167Updated 2 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆132Updated 2 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆182Updated 2 years ago
- An Ansible role for installing Cobalt Strike.☆81Updated last month
- ☆10Updated 4 years ago
- MSBuild without MSbuild.exe☆133Updated 4 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆147Updated 5 years ago
- ☆95Updated 3 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆185Updated 4 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Updated 3 years ago
- Code Exec via Excel☆88Updated 8 years ago
- ☆97Updated 3 years ago
- Run Rubeus via Rundll32☆200Updated 5 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 4 years ago
- Exchangelib wrapper for pentesting☆67Updated 9 months ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆247Updated 4 years ago
- Start new PowerShell without etw and amsi in pure nim☆156Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 3 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆129Updated 4 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆192Updated 4 years ago
- ☆129Updated 2 years ago
- Python based BloodHound data importer☆147Updated 2 years ago
- ☆133Updated 4 years ago
- Bypassing AppLocker with C#☆143Updated 4 years ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated last year