0xVIC / myAPPLockerBypassSummary
Simple APPLocker bypass summary
☆40Updated 6 years ago
Alternatives and similar repositories for myAPPLockerBypassSummary:
Users that are interested in myAPPLockerBypassSummary are comparing it to the libraries listed below
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆54Updated 4 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆84Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆122Updated 3 years ago
- MSBuild without MSbuild.exe☆129Updated 4 years ago
- ☆92Updated 3 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago
- ☆69Updated 3 years ago
- A fake AMSI Provider which can be used for persistence.☆147Updated 3 years ago
- ☆139Updated 2 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆70Updated 4 years ago
- D/Invoke port of UrbanBishop☆106Updated 4 years ago
- Investigation about ACL abusing for Active Directory Certificate Services (AD CS)☆119Updated 3 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆119Updated 3 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆114Updated 3 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆52Updated 8 months ago
- Get Fine Grained Password Policy☆67Updated 9 months ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆83Updated 9 months ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- Load .net assemblies from memory while having them appear to be loaded from an on-disk location.☆162Updated 3 years ago
- ☆27Updated last year
- This code was used for the blogpost on secjuice.☆41Updated 5 years ago
- Code Exec via Excel☆86Updated 7 years ago
- ☆45Updated 3 years ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆140Updated 2 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆180Updated 2 years ago
- .NET project for installing Persistence☆64Updated 3 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆102Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆111Updated last year