Arno0x / TCPRelayInjecter
Tool for injecting a "TCP Relay" managed assembly into unmanaged processes
☆115Updated 5 years ago
Related projects: ⓘ
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆62Updated 5 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆133Updated 7 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆147Updated 5 years ago
- ☆230Updated 6 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆143Updated 4 years ago
- UAC Bypass with mmc via alpc☆155Updated 5 years ago
- Reflective Polymorphism☆104Updated 6 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆250Updated 5 years ago
- How To Execute Shellcode via HTA☆135Updated 6 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆108Updated 3 years ago
- ☆98Updated this week
- DLL Generator for side loading attack☆165Updated 5 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆108Updated 3 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆99Updated 5 years ago
- ☆135Updated this week
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆84Updated 9 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 6 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 7 years ago
- a tool to make it easy and fast to test various forms of injection☆172Updated 5 years ago
- ☆85Updated this week
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆161Updated 7 years ago
- .NET tool for enumeration processes and dumping memory.☆56Updated 5 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆155Updated 5 years ago
- Lateral Movement technique using DCOM and HTA☆228Updated last year
- ☆52Updated this week
- ☆57Updated 3 years ago
- Liniaal - A communication extension to Ruler☆96Updated 6 years ago
- ☆108Updated 6 years ago
- PoC dlls for Task Scheduler COM Hijacking☆89Updated 8 years ago