Create a hidden account
☆75Nov 9, 2017Updated 8 years ago
Alternatives and similar repositories for Windows-User-Clone
Users that are interested in Windows-User-Clone are comparing it to the libraries listed below
Sorting:
- 安全狗sql注入绕过☆29Mar 21, 2018Updated 8 years ago
- tools☆543Apr 9, 2019Updated 6 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Jul 18, 2017Updated 8 years ago
- Learn from Casey Smith @subTee☆240Jul 18, 2017Updated 8 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- powershell to hide process by kd.exe☆31Apr 17, 2021Updated 4 years ago
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago
- ☆16Dec 13, 2017Updated 8 years ago
- 一些漏洞总结。☆12Jul 19, 2018Updated 7 years ago
- A collection of pentest and development tips☆1,126May 26, 2022Updated 3 years ago
- CVE-2017-11882 exploitation☆44Nov 28, 2017Updated 8 years ago
- Use to perform Microsoft exchange account brute-force.☆73Apr 17, 2021Updated 4 years ago
- Use powershell to list the RDP Connections History of logged-in users or all users☆264Apr 17, 2021Updated 4 years ago
- ☆34Mar 7, 2020Updated 6 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆556Jul 3, 2020Updated 5 years ago
- A better alternative to RunDLL32☆35Jun 11, 2019Updated 6 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- 内网渗透中常用的c#程序整合成cs脚本,直接内存加载。持续更新~☆499Feb 13, 2020Updated 6 years ago
- quant trading quant trading quant trading quant trading quant trading quant trading quant trading quant trading quant trading☆135Feb 26, 2026Updated 3 weeks ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- Use CLR to inject all the .NET apps☆185Apr 17, 2021Updated 4 years ago
- Golang实现的x86下的Meterpreter reverse tcp☆39Feb 23, 2020Updated 6 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- 漏洞利用,Vmware vCenter 6.5-7.0 RCE(CVE-2021-21972),上传冰蝎3,getshell☆13Mar 1, 2021Updated 5 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882☆538Nov 29, 2017Updated 8 years ago
- Powershell to copy ntds.dit☆62Jun 30, 2016Updated 9 years ago
- CVE-2017-16995(Ubuntu本地提权漏洞)☆13Sep 8, 2021Updated 4 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- POP3 MITM example☆27Dec 12, 2019Updated 6 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- 内网渗透相关总结☆37Sep 22, 2021Updated 4 years ago
- Windows RID Hijacking persistence technique☆179Nov 20, 2024Updated last year
- ☆62Jul 18, 2017Updated 8 years ago