1d8 / tempinject
☆20Updated 4 years ago
Alternatives and similar repositories for tempinject:
Users that are interested in tempinject are comparing it to the libraries listed below
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago
- ADD/SUB encoder for alphanumeric shellcode☆9Updated 5 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Updated 5 years ago
- Exactly what it sounds like, which is something rad☆21Updated 2 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago
- ZAP plugin demonstrating custom view for WebSocket messages.☆13Updated 2 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆17Updated 7 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- Protect your servers with a secret header☆29Updated 4 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- ☆16Updated 6 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- A Canary which fires when uninstalled☆34Updated 3 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆14Updated 3 years ago
- Random code snippets☆9Updated last year
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Updated 3 years ago
- parsers to make life easier☆12Updated 4 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- ☆16Updated 5 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆16Updated last year