use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)
☆61Aug 4, 2017Updated 8 years ago
Alternatives and similar repositories for COM-Object-hijacking
Users that are interested in COM-Object-hijacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago
- ☆62Jul 18, 2017Updated 8 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- 模式化生成自然人社工字典☆13Jan 10, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- zentao Getshell☆10Oct 27, 2020Updated 5 years ago
- inject shellcode into remote process via message hook☆15Oct 28, 2020Updated 5 years ago
- Windows Api调用,用来绕过杀软添加用户☆22May 15, 2021Updated 4 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆46Sep 16, 2021Updated 4 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- SharpClipHistory is a .NET application written in C# that can be used to read the contents of a user's clipboard history in Windows 10 st…☆200Jan 23, 2020Updated 6 years ago
- ☆19May 31, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Use CLR to inject all the .NET apps☆185Apr 17, 2021Updated 4 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- ☆32Jul 2, 2020Updated 5 years ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- Csharp 反射加载dll☆41Aug 8, 2021Updated 4 years ago
- ☆36Sep 7, 2020Updated 5 years ago
- ☆37Mar 28, 2020Updated 6 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- weaponized tool for CVE-2020-17144☆158Dec 9, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- c# implementation of Active Directory Integrated DNS dumping (authenticated user)☆206May 25, 2021Updated 4 years ago
- 攻击Java Web应用-[Java Web安全]☆15Dec 9, 2020Updated 5 years ago
- 稳定多线程中的inline hook☆16Jun 19, 2019Updated 6 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Nov 4, 2020Updated 5 years ago
- WINDOWS TELEMETRY权限维持☆258Jul 2, 2020Updated 5 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- Use subProcessTag Value From TEB to identify Event Log Threads☆88Apr 17, 2021Updated 4 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆101Sep 30, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆10Jul 5, 2020Updated 5 years ago
- ☆55Jul 18, 2017Updated 8 years ago
- 一个基于docker的安全培训系统☆60Mar 15, 2021Updated 5 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- redteam Build platform☆19Nov 13, 2023Updated 2 years ago
- ☆73Oct 24, 2021Updated 4 years ago
- 日常积累,用以保存学习或比赛 中遇到的漏洞复现文件,会有一些基本的说明文件☆18Apr 24, 2021Updated 4 years ago