CSLDepend / exploits
We store attacks and exploits that we've found useful in our research
☆13Updated 9 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- A Linux RAT in C☆33Updated 6 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 8 years ago
- ☆24Updated 6 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆112Updated 3 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 7 years ago
- Shellcode Of Death☆38Updated 11 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- rev shell and manager in go☆20Updated 5 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆44Updated 4 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- PoC ActiveX SVG Document Execution☆21Updated 6 years ago
- Win32k Elevation of Privilege Poc☆1Updated 6 years ago
- C# AV bypass jank☆32Updated 4 years ago
- Windows 10 Exploit☆30Updated 6 years ago
- My Shellcode Archive☆28Updated 8 years ago
- ☆16Updated 10 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- All about the remote administrative tools☆36Updated 9 years ago
- Quantum Insert Backdoor POC☆11Updated 7 years ago
- Small and highly portable detection tests.☆12Updated 7 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 6 years ago