3gstudent / COM-Object-hijacking
use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)
☆58Updated 7 years ago
Alternatives and similar repositories for COM-Object-hijacking:
Users that are interested in COM-Object-hijacking are comparing it to the libraries listed below
- (Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that…☆43Updated 5 years ago
- Security Support Provider Interface☆46Updated 5 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Updated 6 years ago
- ☆37Updated 7 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- a patched sshd for red team activities☆81Updated 3 years ago
- Use Waitfor.exe to maintain persistence☆54Updated 4 years ago
- Learn from Casey Smith@subTee☆29Updated 4 years ago
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 3 years ago
- Cobalt Strike AggressorScripts CVE-2020-0796☆78Updated 4 years ago
- beacon,aggressor-scripts,cna,cobalt-strike,email☆36Updated 5 years ago
- XOR Payload Encryptor for .NET and Payload Runner with Built-in XOR Decryptor☆45Updated 6 years ago
- Use to perform Microsoft exchange account brute-force.☆73Updated 4 years ago
- Play Doh Windows ACL Tools☆62Updated 2 years ago
- SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.☆90Updated 4 years ago
- Aggressor script to integrate Phant0m with Cobalt Strike☆27Updated 7 years ago
- Yet another LSASS dumper☆76Updated 4 years ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆65Updated 9 months ago
- StenographyShellcodeLoader☆43Updated 4 years ago
- Collect & Optimize awesome CobaltStrike aggressor scripts, hope to create a All-In-One framework.☆37Updated 5 years ago
- 详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload☆30Updated 4 years ago
- Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)☆164Updated 4 years ago
- 使得Cobaltstrike支持Atexec☆87Updated 4 years ago
- ShellCode Loader for MSF and Cobalt Strike☆55Updated 11 months ago
- Cobaltstrike Aggressor Scripts☆28Updated 8 years ago
- c# implementation of Active Directory Integrated DNS dumping (authenticated user)☆202Updated 3 years ago
- ☆39Updated 5 years ago
- CVE-2021-1675 (PrintNightmare)☆76Updated 3 years ago
- Aggressor Script to launch IE driveby for CVE-2018-15982.☆28Updated 5 years ago
- Use to browse the share file by eas(Exchange Server ActiveSync)☆45Updated 4 years ago