fileless-attack
Here are 8 public repositories matching this topic...
🚫💾 Run binaries straight from memory in Linux
-
Updated
Apr 17, 2023 - Go
k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.
-
Updated
Aug 30, 2021 - Shell
execute PE in memory Filelessly
-
Updated
Feb 8, 2025 - Python
Made a sample fileless malware which could cause potential harm if used correctly.
-
Updated
Dec 9, 2023 - C++
Fileless Shellcode Loader with Python
-
Updated
Feb 22, 2024 - Python
A fileless process injector written in PowerShell for injecting shellcode and migrating your existing shell to new processes
-
Updated
Jul 25, 2024 - PowerShell
This case study analyzed a fileless privilege escalation attack where the adversary exploited an undocumented administrative override parameter (admin_override=true) to bypass standard authentication and gain elevated access without triggering any alert or logging trail through normal access controls.
-
Updated
May 13, 2025 - Jupyter Notebook
Improve this page
Add a description, image, and links to the fileless-attack topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the fileless-attack topic, visit your repo's landing page and select "manage topics."