ASkyeye / ImpulsiveDLLHijackLinks
C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
☆16Updated 4 years ago
Alternatives and similar repositories for ImpulsiveDLLHijack
Users that are interested in ImpulsiveDLLHijack are comparing it to the libraries listed below
Sorting:
- 通过websocket在IIS8(Windows Server 2012)以上实现socks5代理☆89Updated last year
- Zerologon自动化脚本☆96Updated 2 years ago
- 域内普通域用户权限查找域内所有计算机上登录的用户☆151Updated 2 years ago
- Confluence未授权添加管理员用户(CVE-2023-22515)漏洞利用工具☆109Updated last year
- ☆49Updated 2 years ago
- Cobalt Strike BOF that Add a user to localgroup by samr☆131Updated 2 years ago
- 密码收集☆58Updated 3 years ago
- ad vulnerability scanner☆73Updated last year
- Zerologon exploit with restore DC password automatically☆140Updated last year
- 根据攻防以及域信息收集经验dump快而有用的域信息☆102Updated 2 years ago
- BOF implementation of delete self poc that delete a locked executable or a currently running file from disk by its pid, path, or the curr…☆77Updated 2 years ago
- CS shellcode 加载器☆61Updated 3 years ago
- This is a daemon process which make a programe runing all time.☆84Updated 3 years ago
- Lsass memory dump.☆53Updated last year
- ShellcodeFrame☆30Updated 3 years ago
- mssqlproxy python3.5+ 并修复bug☆64Updated 2 years ago
- 利用EFSRPC协议批量探测出网☆65Updated last year
- Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user; Adding the sam_the_admin_maq when MachineAccoun…☆22Updated last year
- impacket编程手册☆105Updated last year
- 通过C/C++实现的 Windows RID Hijacking persistence technique (RID劫持 影子账户 账户克隆).☆84Updated 3 years ago
- 魔改shadowsocks,实现socks5内网穿透。☆62Updated last year
- 主要用于隐藏进程真实路径,进程带windows真签名☆114Updated 11 months ago
- (批量化改造)sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。☆108Updated 4 years ago
- 远程创建任务计划工具☆189Updated 3 years ago
- 提取域控日志,支持远程提取☆168Updated 6 months ago
- ☆94Updated 2 years ago
- 一个用于隐藏C2的、开箱即用的反向代理服务器。旨在省去繁琐的配置Nginx服务的过程。☆81Updated 3 years ago
- Search msDS-AllowedToActOnBehalfOfOtherIdentity☆35Updated 3 years ago
- If you only have hash, you can still operate exchange☆76Updated 3 years ago
- 隐藏c2的巧妙方法使用slack平台☆11Updated 3 years ago