0x00-0x00 / NamedPipes
Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.
☆16Updated 5 years ago
Alternatives and similar repositories for NamedPipes:
Users that are interested in NamedPipes are comparing it to the libraries listed below
- ☆14Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 6 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- C# code to run PIC using CreateThread☆16Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last week
- all published scripts devloped by ahmed khlief☆20Updated 4 years ago
- C# Situational Awareness Script☆34Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- Execute shellcode with syscalls from C# .dll☆12Updated 4 years ago
- ☆14Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆24Updated 2 years ago
- ☆16Updated 5 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆17Updated 7 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago
- Windows privilege escalation Mafia is a framework provides all resources needed for privilege escalation beginners☆12Updated 3 years ago
- PoC code from blog☆16Updated 4 years ago
- Example of async client/server sockets in .NET 5☆16Updated 3 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- POC code to crash Windows Event Logger Service☆26Updated 4 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆20Updated 4 years ago
- I used this to see if an EDR is running in Safe Mode☆35Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago