Double Venom (DVenom) is a tool that helps red teamers bypass AVs by providing an encryption wrapper and loader for …

Double Venom (DVenom) is a tool that helps red teamers bypass AVs by providing an encryption wrapper and loader for …
GATOR – GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments. …
Commander is a command and control framework (C2) written in Python, Flask and SQLite. It comes with two agents written in …
ModuleShifting is stealthier variation of Module Stomping and Module overloading injection technique. It is actually implemented in Python ctypes so …
This POC is inspired by James Forshaw (@tiraniddo) shared at BlackHat USA 2022 titled “Taking Kerberos To The Next Level …
“Python memory module” AI generated pic – hotpot.ai pure-python implementation of MemoryModule technique to load a dll or unmanaged exe …
Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other …
Pyramid is a set of Python scripts and module dependencies that can be used to evade EDRs. The main purpose …
A standalone python3 remake of the classic “tree” command with the additional feature of searching for user provided keywords/regex in …
A GUI tool for scanning RPC communication through Event Tracing for Windows (ETW). The tool was published as part of …