Add my own POC to test Visual Studio trick to run code when building
☆22Jul 18, 2017Updated 8 years ago
Alternatives and similar repositories for p0wnedShell-DarkVersion
Users that are interested in p0wnedShell-DarkVersion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Small modification version of p0wnedShell☆39Apr 25, 2016Updated 10 years ago
- powershell to hide process by kd.exe☆31Apr 17, 2021Updated 5 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 9 years ago
- Powershell to CodeExecution and ProcessInjection☆65Jul 18, 2017Updated 8 years ago
- ☆55Jul 18, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆16Apr 17, 2021Updated 5 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆11Jun 3, 2017Updated 8 years ago
- ☆35Jul 18, 2017Updated 8 years ago
- Anti-Debug methods with C#☆14Dec 20, 2020Updated 5 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- DLL Injection Library & Tools☆74Jul 5, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Keyboard Weak Password☆28Mar 29, 2016Updated 10 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- source&exe☆39Jul 18, 2017Updated 8 years ago
- Learn from Casey Smith @subTee☆238Jul 18, 2017Updated 8 years ago
- c programming☆10Oct 31, 2020Updated 5 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Monitor and prevent unexpected behavior of Java programs.☆14Jul 6, 2021Updated 4 years ago
- Powershell to copy ntds.dit☆62Jun 30, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ACTIVELabs Security Advisories☆24May 19, 2021Updated 4 years ago
- A collaborative CTF framework written in Django.☆17Nov 6, 2014Updated 11 years ago
- MS16-032(CVE-2016-0099) for SERVICE ONLY☆83Mar 15, 2017Updated 9 years ago
- Fork/mirror of Darcs repo for PyFlag (Forensic and Log Analysis GUI)☆36Oct 16, 2010Updated 15 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Jun 22, 2016Updated 9 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆18Nov 28, 2013Updated 12 years ago
- ☆22May 29, 2020Updated 5 years ago
- Collection of scripts, binaries and the like to aid in WhiteList Evasion on a Microsoft Windows Network.☆127May 27, 2015Updated 10 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 9 years ago
- nano javascript WebSocket client SDK for egret engine.☆10Oct 10, 2017Updated 8 years ago
- ☆25Jan 26, 2016Updated 10 years ago
- Steganography Payload☆49Jul 18, 2017Updated 8 years ago