0x00-0x00 / NamedPipesLinks
Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.
☆16Updated 6 years ago
Alternatives and similar repositories for NamedPipes
Users that are interested in NamedPipes are comparing it to the libraries listed below
Sorting:
- ☆14Updated 6 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Updated 3 months ago
- ☆17Updated 7 years ago
- C# Situational Awareness Script☆34Updated 6 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- AppXSVC Service race condition - privilege escalation☆29Updated 6 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆74Updated 6 years ago
- PoC code from blog☆16Updated 5 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 5 years ago
- I used this to see if an EDR is running in Safe Mode☆36Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 8 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 7 years ago
- This repository contains some details about abusing outlook.☆27Updated 7 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Updated 9 years ago
- ☆21Updated 5 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- ☆50Updated 5 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Updated 5 years ago
- Windows 10 Exploit☆30Updated 6 years ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Updated 4 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
- ☆45Updated 7 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Updated 5 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Updated 6 years ago