Codeh4ck / UPnP-Port-ForwarderLinks
A simple UPnP port forward tool
☆19Updated 7 years ago
Alternatives and similar repositories for UPnP-Port-Forwarder
Users that are interested in UPnP-Port-Forwarder are comparing it to the libraries listed below
Sorting:
- A x86/x64 class library that can be injected into unmanaged processes☆11Updated 5 years ago
- Binds two files together and updates the stub accordingly. The stub will then drop and execute both files.☆15Updated 9 years ago
- A Chrome extension to steal your passwords☆21Updated 4 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Updated 6 years ago
- Kill AMSI in a remote process PoC☆10Updated 7 years ago
- A advanced gui for windows version of metasploit created using C# and Visual Studio. NOTE: Does not use RPC☆26Updated 6 years ago
- Trojan downloader simple virus☆16Updated 7 years ago
- A TCP-Client connected Keylogger in C#☆12Updated 8 years ago
- Hide .Net assembly into png images☆36Updated 6 years ago
- C# program that takes process id and path to DLL payload to perform DLL injection method.☆53Updated 6 years ago
- Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).☆21Updated 6 years ago
- Loading a native DLL in the memory.☆70Updated 7 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Updated 6 years ago
- The project uses popular anti-virus protection bypass techniques☆12Updated 7 years ago
- C++ Host .NET CLR & Run a assembly directly from ressource (RT_RCDATA) without extraction disk.☆15Updated 2 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Updated 7 years ago
- A sample spyware written in VB.NET☆20Updated 8 years ago
- Go Advance Trojan Server For Windows Using Twitter As The C&C Server☆17Updated 8 years ago
- A recreation of the Windows XP environment☆18Updated 5 months ago
- MBR virus☆25Updated 4 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Updated 7 years ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Updated 6 years ago
- A reduced functionality cli client for the imdisk ram disk driver. To be used through a backdoor like meterpreter☆24Updated 7 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 4 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 7 years ago
- ImperiumRAT is an advanced remote administration tool with features like (Remote desktop, Disable CMD, Turn on/off webcam, and more!)☆12Updated 3 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- ☆29Updated 7 years ago
- ☆11Updated 6 years ago
- Disabling Windows Defender & downloading payload☆21Updated 5 years ago