☆16Apr 17, 2021Updated 4 years ago
Alternatives and similar repositories for Execute-CSharp-From-XSLT-TEST
Users that are interested in Execute-CSharp-From-XSLT-TEST are comparing it to the libraries listed below
Sorting:
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- PoC of a protected process causing a blue screen if killed.☆15Jul 31, 2018Updated 7 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago
- Slightly modified version of https://raw.githubusercontent.com/killswitch-GUI/CobaltStrike-ToolKit/master/HTTPsC2DoneRight.sh☆12Nov 16, 2017Updated 8 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆46Jun 10, 2016Updated 9 years ago
- ☆15Apr 12, 2018Updated 7 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Useful windows tools for Blue, Red & Purple teams☆11Feb 22, 2026Updated last week
- A tool to run .Net DLLs from the command line☆105Oct 23, 2018Updated 7 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- A websocket proxy☆55Nov 13, 2017Updated 8 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- Phishing Template Generation Made Easy☆165Nov 27, 2017Updated 8 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Jan 24, 2020Updated 6 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- powershell to hide process by kd.exe☆31Apr 17, 2021Updated 4 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- automatic scan for hackthebox☆13Jan 14, 2020Updated 6 years ago
- CVE-2017-0199☆16Apr 19, 2017Updated 8 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- A set of vulnerable machines rendered by Packer and Ansible scripts.☆13Feb 15, 2021Updated 5 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Oct 27, 2013Updated 12 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago