Create a hidden account
☆75Nov 9, 2017Updated 8 years ago
Alternatives and similar repositories for Windows-User-Clone
Users that are interested in Windows-User-Clone are comparing it to the libraries listed below
Sorting:
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- 安全狗sql注入绕过☆29Mar 21, 2018Updated 7 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Jul 18, 2017Updated 8 years ago
- A better alternative to RunDLL32☆35Jun 11, 2019Updated 6 years ago
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago
- powershell to hide process by kd.exe☆31Apr 17, 2021Updated 4 years ago
- tools☆542Apr 9, 2019Updated 6 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- Use to perform Microsoft exchange account brute-force.☆73Apr 17, 2021Updated 4 years ago
- Use powershell to list the RDP Connections History of logged-in users or all users☆264Apr 17, 2021Updated 4 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- Learn from Casey Smith @subTee☆240Jul 18, 2017Updated 8 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- A collection of pentest and development tips☆1,125May 26, 2022Updated 3 years ago
- Hide Mimikatz From Process Lists☆20Jul 10, 2015Updated 10 years ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Use CLR to inject all the .NET apps☆184Apr 17, 2021Updated 4 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Oct 30, 2019Updated 6 years ago
- ☆12Dec 15, 2016Updated 9 years ago
- Jar Protector - Jar Crypter☆15May 18, 2018Updated 7 years ago
- A simple parser(library) which extracts shimcache data from windows.☆15May 20, 2019Updated 6 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- simple shellcode loader for linux & win, x86 & x64☆34Nov 5, 2016Updated 9 years ago
- POP3 MITM example☆27Dec 12, 2019Updated 6 years ago
- solana pumpfun, pump swap copy sniper (pump fun) trading bot☆134Sep 7, 2025Updated 5 months ago
- ☆16Dec 13, 2017Updated 8 years ago
- 一些漏洞总结。☆12Jul 19, 2018Updated 7 years ago
- An AntSword's plugin to scan webshell☆16Sep 2, 2019Updated 6 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago