CuckooEXE / PopCalcLinks
DLL to open up calc.exe to demonstrate that you injected DLLs
☆23Updated 4 years ago
Alternatives and similar repositories for PopCalc
Users that are interested in PopCalc are comparing it to the libraries listed below
Sorting:
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ☆20Updated 2 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- ☆26Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆29Updated 6 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- .NET project for installing Persistence☆64Updated 3 years ago
- Modified version of Pypykatz to print encrypted credentials☆51Updated 2 years ago
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Updated last year
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sa…☆20Updated 2 years ago
- ☆29Updated 2 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- Pwnage☆16Updated 3 months ago
- .Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac☆62Updated 2 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 4 years ago
- Active Directory certificate abuse.☆38Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- ☆19Updated 4 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Updated 4 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆16Updated 10 months ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Updated 2 years ago
- Tools for Attacking Pleasant Password Server☆22Updated last year
- ☆30Updated 2 years ago
- Right-To-Left Override POC☆34Updated 3 years ago
- Automating payload generation for OSEP labs and exam.☆34Updated 2 years ago
- ☆23Updated 3 years ago