3gstudent / Use-msxsl-to-bypass-AppLockerView external linksLinks
Learn from Casey Smith@subTee
☆29Apr 17, 2021Updated 4 years ago
Alternatives and similar repositories for Use-msxsl-to-bypass-AppLocker
Users that are interested in Use-msxsl-to-bypass-AppLocker are comparing it to the libraries listed below
Sorting:
- redteam Build platform☆19Nov 13, 2023Updated 2 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- 聚合交易平台BitLeague☆11Sep 30, 2018Updated 7 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Python3版本Poc-T(渗透测试插件化并发框架)☆11Apr 3, 2020Updated 5 years ago
- a parser for the .map file included in the aimware leak☆16Feb 19, 2023Updated 2 years ago
- Docker for vulnerability environment with web ui☆14Mar 18, 2019Updated 6 years ago
- crypto args for golang☆17Feb 14, 2022Updated 4 years ago
- source&exe☆38Jul 18, 2017Updated 8 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- CVE-2022-24112:Apache APISIX apisix/batch-requests RCE☆44Feb 22, 2022Updated 3 years ago
- Automated WireGuard Deployment on Azure☆46Feb 28, 2021Updated 4 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆110Sep 18, 2018Updated 7 years ago
- Cobalt Strike 的 CVE-2024-35250 的 BOF。(请给我加个星,谢谢。)☆15Oct 21, 2024Updated last year
- ☆29Oct 17, 2018Updated 7 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 7 years ago
- Rust crate to simplify Windows ACL operations☆19Jun 9, 2023Updated 2 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- exchange-ssrf-rce☆78Mar 14, 2021Updated 4 years ago
- Passwordless RDP Session Hijacking☆70Aug 28, 2021Updated 4 years ago
- Browser Fuzzing with Machine Learning☆22Mar 6, 2019Updated 6 years ago
- Linux-KVM with rVMI extensions☆22Aug 28, 2017Updated 8 years ago
- 逆向小红伞杀毒软件驱动——avdevprot☆24Dec 3, 2017Updated 8 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Jul 21, 2020Updated 5 years ago
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- A BurpSuite extension for lair☆28Oct 18, 2017Updated 8 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Jun 15, 2018Updated 7 years ago
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Oct 26, 2019Updated 6 years ago
- RoR / Devise PoC in memory Backdoor☆29Dec 14, 2014Updated 11 years ago
- CVE & others☆19Aug 14, 2018Updated 7 years ago
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Jul 4, 2014Updated 11 years ago
- Aggressor Script to launch IE driveby for CVE-2018-4878☆87Feb 10, 2018Updated 8 years ago
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- ☆30Sep 5, 2025Updated 5 months ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 4 years ago
- Asynchronous NFSv3 client in pure Python☆28Jul 16, 2025Updated 7 months ago
- Grafana Arbitrary File Reading Vulnerability☆27Dec 7, 2021Updated 4 years ago