☆16Apr 17, 2021Updated 4 years ago
Alternatives and similar repositories for Execute-CSharp-From-XSLT-TEST
Users that are interested in Execute-CSharp-From-XSLT-TEST are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Portable utility to execute in memory a sequence of opcodes☆18Aug 28, 2016Updated 9 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Class implementation of PowerLoader injection technique☆32Dec 23, 2016Updated 9 years ago
- PoC of a protected process causing a blue screen if killed.☆15Jul 31, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Outlook addin Back Door☆11Dec 2, 2015Updated 10 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- A "tiny" meterpreter stager☆128Aug 20, 2019Updated 6 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Add my own POC to test Visual Studio trick to run code when building☆22Jul 18, 2017Updated 8 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- powershell to hide process by kd.exe☆31Apr 17, 2021Updated 4 years ago
- CVE-2017-0199☆16Apr 19, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Jul 18, 2017Updated 8 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- ☆52Sep 15, 2016Updated 9 years ago
- An example pattern in C# for watching security events (logon/logoff/privilege)☆17Aug 13, 2018Updated 7 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- A basic Django project that implements an IVR telephony system with Twilio☆12Jul 17, 2014Updated 11 years ago
- A simple MBR hijack demonstration☆181Oct 22, 2022Updated 3 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- A websocket proxy☆55Nov 13, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Phishing Template Generation Made Easy☆165Nov 27, 2017Updated 8 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- Traverse JS files for APIs/Endpoints☆15May 12, 2015Updated 10 years ago
- Shell Tool for BIOS Developer☆12Jan 20, 2017Updated 9 years ago
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 10 years ago
- 一个简单的NIDS系统☆15May 17, 2017Updated 8 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆36Nov 15, 2024Updated last year