use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)
☆60Aug 4, 2017Updated 8 years ago
Alternatives and similar repositories for COM-Object-hijacking
Users that are interested in COM-Object-hijacking are comparing it to the libraries listed below
Sorting:
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago
- ☆62Jul 18, 2017Updated 8 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- 模式化生成自然人社工字典☆13Jan 10, 2022Updated 4 years ago
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- zentao Getshell☆10Oct 27, 2020Updated 5 years ago
- inject shellcode into remote process via message hook☆15Oct 28, 2020Updated 5 years ago
- Windows Api调用,用来绕过杀软添加用户☆22May 15, 2021Updated 4 years ago
- 后渗透持久化控制平台; Windows Persistence Platform;☆46Sep 16, 2021Updated 4 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- SharpClipHistory is a .NET application written in C# that can be used to read the contents of a user's clipboard history in Windows 10 st…☆200Jan 23, 2020Updated 6 years ago
- ☆19May 31, 2017Updated 8 years ago
- Use CLR to inject all the .NET apps☆185Apr 17, 2021Updated 4 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- ☆32Jul 2, 2020Updated 5 years ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- Csharp 反射加载dll☆41Aug 8, 2021Updated 4 years ago
- ☆37Mar 28, 2020Updated 5 years ago
- ☆36Sep 7, 2020Updated 5 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- weaponized tool for CVE-2020-17144☆158Dec 9, 2020Updated 5 years ago
- c# implementation of Active Directory Integrated DNS dumping (authenticated user)☆206May 25, 2021Updated 4 years ago
- 攻击Java Web应用-[Java Web安全]☆15Dec 9, 2020Updated 5 years ago
- 稳定多线程中的inline hook☆16Jun 19, 2019Updated 6 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Nov 4, 2020Updated 5 years ago
- WINDOWS TELEMETRY权限维持☆258Jul 2, 2020Updated 5 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- Use subProcessTag Value From TEB to identify Event Log Threads☆88Apr 17, 2021Updated 4 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆101Sep 30, 2020Updated 5 years ago
- ☆10Jul 5, 2020Updated 5 years ago
- ☆55Jul 18, 2017Updated 8 years ago
- 一个基于docker的安全培训系统☆60Mar 15, 2021Updated 5 years ago
- A *very* imperfect attempt to correlate Kernel32 function calls to native API (Nt/Zw) counterparts/execution flow.☆28Dec 16, 2021Updated 4 years ago
- redteam Build platform☆19Nov 13, 2023Updated 2 years ago
- ☆73Oct 24, 2021Updated 4 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆121Jun 24, 2020Updated 5 years ago