zznop / pop-nedryView external linksLinks
x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)
☆85Nov 7, 2020Updated 5 years ago
Alternatives and similar repositories for pop-nedry
Users that are interested in pop-nedry are comparing it to the libraries listed below
Sorting:
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Sep 26, 2021Updated 4 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Dec 13, 2017Updated 8 years ago
- Encrypted exploit delivery for the masses☆270Sep 25, 2019Updated 6 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆178Jul 21, 2020Updated 5 years ago
- ☆524Aug 11, 2023Updated 2 years ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Feb 12, 2021Updated 5 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Local Privilege Escalation☆210Feb 28, 2017Updated 8 years ago
- C# code to run shellcode in a sneaky way☆93Oct 2, 2020Updated 5 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Collection of social engineering payloads☆299Oct 19, 2017Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 6 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆359Nov 19, 2024Updated last year
- few months old but better than nothing☆58Feb 11, 2022Updated 4 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- A Metasploit auto auxiliary script☆103Oct 11, 2022Updated 3 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Jul 27, 2017Updated 8 years ago
- Collection of PowerShell scripts☆450Dec 18, 2017Updated 8 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆401May 20, 2020Updated 5 years ago
- Open source offensive security platform for red team, by red team.☆384Oct 23, 2017Updated 8 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Aug 8, 2018Updated 7 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆62Jul 8, 2017Updated 8 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆162Apr 11, 2017Updated 8 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago