Add my own POC to test Visual Studio trick to run code when building
☆22Jul 18, 2017Updated 8 years ago
Alternatives and similar repositories for p0wnedShell-DarkVersion
Users that are interested in p0wnedShell-DarkVersion are comparing it to the libraries listed below
Sorting:
- Small modification version of p0wnedShell☆40Apr 25, 2016Updated 9 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 8 years ago
- powershell to hide process by kd.exe☆31Apr 17, 2021Updated 4 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Monitor and prevent unexpected behavior of Java programs.☆14Jul 6, 2021Updated 4 years ago
- Keyboard Weak Password☆28Mar 29, 2016Updated 9 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Jun 22, 2016Updated 9 years ago
- Powershell to CodeExecution and ProcessInjection☆65Jul 18, 2017Updated 8 years ago
- ☆55Jul 18, 2017Updated 8 years ago
- Python script to exploit CVE-2015-4852.☆31Jul 20, 2016Updated 9 years ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Aug 4, 2023Updated 2 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- Generate 1337 speak permutations of words from a wordlist☆21Dec 20, 2017Updated 8 years ago
- Fork/mirror of Darcs repo for PyFlag (Forensic and Log Analysis GUI)☆36Oct 16, 2010Updated 15 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- ☆35Jul 18, 2017Updated 8 years ago
- DLL Injection Library & Tools☆73Jul 5, 2016Updated 9 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- ☆22May 29, 2020Updated 5 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- The Paper Artifact Availability☆20Aug 26, 2022Updated 3 years ago
- PE文件打包器。将一系列的插件dll(寄生dll),打包捆绑到目标exe中,以寄生的方式改变程序的原有行为。寄生的dll完全手动装配,隐藏执行;宿主被恢复后,会被寄生dll强势再感染。☆24Jan 18, 2013Updated 13 years ago
- CTF stuff☆40Dec 5, 2022Updated 3 years ago
- Learn from Casey Smith @subTee☆240Jul 18, 2017Updated 8 years ago
- log4j-patch 修改字节码实现补丁防御☆20Dec 10, 2021Updated 4 years ago
- Remote Java classpath enumeration via deserialization☆22May 23, 2023Updated 2 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- MS16-032(CVE-2016-0099) for SERVICE ONLY☆83Mar 15, 2017Updated 8 years ago
- ACTIVELabs Security Advisories☆24May 19, 2021Updated 4 years ago
- A fastjson payload generator☆59Oct 13, 2020Updated 5 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 8 years ago
- ☆164Aug 28, 2015Updated 10 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- This is a Cheatsheet for CTF Challenges categorized by different Privilege Escalation Methods☆28Aug 21, 2019Updated 6 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago