Giter VIP home page Giter VIP logo

sacwtv's Projects

jpg-png-exploit-downloader-fud-cryter-malware-builder-cve-2022 icon jpg-png-exploit-downloader-fud-cryter-malware-builder-cve-2022

Vulnerability Disclosure Timeline Closer inspection of the Exploit JPG content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit JPG from Python encrypted code content which we also implement in couple of our builders.Silent JPG Exploit There are multiple Exploit JPG in Silent JPG Exploit, a package commonly used by web services to process Exploit JPG File. One of the vulnerabilities can lead to remote code execution (RCE) if you process user submitted JPG. The exploit for this vulnerability is being used in the wild.Why Are You Disclosing A Exploit JPG

koadic icon koadic

Koadic C3 COM Command & Control - JScript RAT

koppeling icon koppeling

Adaptive DLL hijacking / dynamic export forwarding

letsgo icon letsgo

Shellcode Injection via Callbacks and Steganography.

ljd icon ljd

LuaJIT raw-bytecode decompiler

malleable-c2-profiles icon malleable-c2-profiles

Cobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike https://www.cobaltstrike.com/.

mimic icon mimic

Hide processes as a normal user in Linux.

nimloader icon nimloader

load dumped csharp binaries as assemblies and launch them in memory

offensivenim icon offensivenim

My experiments in weaponizing Nim (https://nim-lang.org/)

pash icon pash

Mono Version of PowerShell 3.0

password-history-cookies-card-exodus-metamask-token-stealer-all-browsers-grabber icon password-history-cookies-card-exodus-metamask-token-stealer-all-browsers-grabber

his is a P.O.C bitcoin stealer strictly for educational purposes written in C# purely ... Sole purpose is to detect the user's bitcoin wallet and change it to the malicious bitcoin wallet Quite basic so all trolls allowed.A (v3.5 compatible) .NET tool for stealing and importing certificates in the Windows certificate store without touching disk. Useful for red team operations where you need to poach a certificate for pivoting purposes and want to do so with an in-memory post-ex payload. This tool is flagged as malware by Defender. DO NOT run it from disk on-target. DO NOT run it in memory on target WITHOUT AMSI BYPASSED. And DO obfuscate it with a tool like ConfuserEx, just in case.

pegasus-pantheon-hvnc-v2-vnc-hidden-browser-remote-administration-rat icon pegasus-pantheon-hvnc-v2-vnc-hidden-browser-remote-administration-rat

What is Hidden VNC Hidden VNC is technique used by most advanced users, and by fark the most exiciting way to manage your Computer System hidden without interacting with the main desktop at all, simply because it creates a new hidden desktop. Since you mentioned that the software is used by advanced users,does it imply that i won't be able to use it since i am a intermediate user Absolutely not, the software is desinged for intermediate users as well allowing you with click of a button to manage your computer systems.

pillager icon pillager

Pillager是一个适用于后渗透期间的信息收集工具

pplkiller icon pplkiller

Tool to bypass LSA Protection (aka Protected Process Light)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.