Category: Exploitation

cross-platform C2

Medusa: cross-platform C2 agent

Medusa Medusa is a cross-platform C2 agent compatible with both Python 3.8 and Python 2.7. Notable Features Dynamic loading/unloading of agent functions to limit exposure of agent capabilities on-disk. Loading of Python modules in-memory...

SharpSphere

SharpSphere v2.1 releases: Attacking vSphere Infrastructure

SharpSphere – Attacking vSphere Infrastructure SharpSphere gives red teamers the ability to easily interact with the guest operating systems of virtual machines managed by vCenter. It uses the vSphere Web Services API and exposes...

Process Hollowing Nim

NimHollow: Nim implementation of Process Hollowing

NimHollow Playing around with the Process Hollowing technique using Nim. Features: Direct syscalls for triggering Windows Native API functions with NimlineWhispers. Shellcode encryption/decryption with AES in CTR mode. Simple sandbox detection methods from the OSEP course by @offensive-security....

shellcode injection techniques

DInjector: Collection of shellcode injection techniques

DInjector This repository is an accumulation of my code snippets for various shellcode injection techniques using fantastic D/Invoke API by @TheWover and @FuzzySecurity. Features: Fully ported to D/Invoke API. Encrypted payloads which can be invoked from a URL...

reverse shell for Linux

xc: small reverse shell for Linux & Windows

XC Netcat like a reverse shell for Linux & Windows. Features Windows Usage: └ Shared Commands: !exit !upload <src> <dst> * uploads a file to the target !download <src> <dst> * downloads a file...