3gstudent / Eventlogedit-evtx--Evolution
Remove individual lines from Windows XML Event Log (EVTX) files
☆260Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Eventlogedit-evtx--Evolution
- ☆347Updated 2 years ago
- Cobalt Strike Python API☆292Updated 2 years ago
- Scripts for performing and detecting parent PID spoofing☆139Updated 4 years ago
- Lateral Movement technique using DCOM and HTA☆228Updated 2 years ago
- A tool mainly to erase specified records from Windows event logs, with additional functionalities.☆588Updated 6 years ago
- ☆277Updated 3 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆170Updated 4 years ago
- Use CLR to inject all the .NET apps☆182Updated 3 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆321Updated 5 years ago
- A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls☆433Updated 2 years ago
- ☆184Updated 3 years ago
- a tool to make it easy and fast to test various forms of injection☆172Updated 5 years ago
- NTDS.dit offline dumper with non-elevated☆211Updated 6 years ago
- SharpClipHistory is a .NET application written in C# that can be used to read the contents of a user's clipboard history in Windows 10 st…☆189Updated 4 years ago
- AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.☆384Updated 5 years ago
- Binaries, PowerShell scripts and information about Digital Signature Hijacking.☆211Updated 7 years ago
- A library for integrating communication channels with the Cobalt Strike External C2 server☆281Updated 6 years ago
- Position Independent Windows Shellcode Written in C☆287Updated 6 years ago
- Run shellcode from resource☆253Updated 3 years ago
- Tool to create hidden registry keys.☆465Updated 5 years ago
- CobaltStrike External C2 for Websockets☆194Updated 5 years ago
- Example DLL to load from Windows NetShell☆177Updated 8 years ago
- PSAmsi is a tool for auditing and defeating AMSI signatures.☆386Updated 6 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆175Updated 2 months ago
- Evading WinDefender ATP credential-theft☆253Updated 4 years ago
- initial commit☆172Updated 6 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆223Updated 5 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆341Updated 4 years ago
- A PoC WMI backdoor presented at Black Hat 2015☆269Updated 9 years ago
- Automated DLL Enumerator☆526Updated 6 years ago