☆12Mar 27, 2024Updated last year
Alternatives and similar repositories for PythonShellcodeRedux
Users that are interested in PythonShellcodeRedux are comparing it to the libraries listed below
Sorting:
- PhantomsGate: Advanced Shellcode Injection Technique☆26Jul 15, 2024Updated last year
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- A tool to display Windows Event logs as they happen.☆14Sep 19, 2023Updated 2 years ago
- Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).☆14Apr 25, 2023Updated 2 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- ☆20Nov 13, 2025Updated 3 months ago
- ☆20Mar 21, 2024Updated last year
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Apr 26, 2020Updated 5 years ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- Metasploit automation. Why work when a minion can do it?☆21May 9, 2017Updated 8 years ago
- C# .NET Assembly to perform LDAP Queries☆27Apr 1, 2021Updated 4 years ago
- ChatGPT queries via OpenAI API in your terminal☆62Feb 14, 2023Updated 3 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Jan 30, 2025Updated last year
- Information for accessing The Cyber Plumber's Handbook Lab☆31Oct 10, 2022Updated 3 years ago
- ☆32Jun 1, 2024Updated last year
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆28Dec 3, 2020Updated 5 years ago
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago
- Load PE via XML Attribute☆32Feb 1, 2020Updated 6 years ago
- Set the process mitigation policy for loading only Microsoft Modules , and block any userland 3rd party modules☆43May 6, 2023Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Jul 12, 2024Updated last year
- C code to enable ETW tracing for Dotnet Assemblies☆32Aug 12, 2022Updated 3 years ago
- Python library for parsing AccessData AD1 images☆33Jun 1, 2023Updated 2 years ago
- shellcode-loaders and beacon-loaders☆72Nov 7, 2023Updated 2 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated 3 weeks ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.☆10Jan 1, 2025Updated last year
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- A Modern, stable and advanced login system.☆13Oct 13, 2021Updated 4 years ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- Documentation for Flexberry projects☆11Dec 17, 2025Updated 2 months ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Aug 28, 2023Updated 2 years ago
- ☆39Sep 26, 2022Updated 3 years ago
- ☆47Feb 11, 2023Updated 3 years ago