DoctorLai / VBScript_Obfuscator
The VBScript Obfuscator written in VBScript
☆115Updated 3 years ago
Alternatives and similar repositories for VBScript_Obfuscator
Users that are interested in VBScript_Obfuscator are comparing it to the libraries listed below
Sorting:
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆92Updated 3 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆58Updated 7 years ago
- Windows Defender ShellCode Execution Bypass☆128Updated 5 years ago
- ReVBShell - Reverse VBS Shell☆81Updated 5 years ago
- SharpClipHistory is a .NET application written in C# that can be used to read the contents of a user's clipboard history in Windows 10 st…☆195Updated 5 years ago
- ☆91Updated 4 years ago
- Example DLL to load from Windows NetShell☆179Updated 8 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Updated 6 years ago
- Small tool to get a SYSTEM shell☆127Updated 9 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆115Updated 5 years ago
- Execute .Net assemblies using Rundll32.exe☆110Updated 4 years ago
- External C2 Using IE COM Objects☆100Updated 6 years ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆114Updated last year
- SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.☆90Updated 4 years ago
- exe2powershell - exe2bat reborn for modern Windows☆172Updated 4 years ago
- Used to create wrappers and proxy libraries for Windows binaries.☆75Updated 13 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆228Updated 5 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆265Updated 5 years ago
- Shellcode injection POC using syscalls.☆116Updated 4 years ago
- SMBExec C# module☆216Updated 4 years ago
- Binaries, PowerShell scripts and information about Digital Signature Hijacking.☆216Updated 7 years ago
- ☆112Updated 4 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆67Updated 6 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆35Updated 4 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Updated 5 years ago
- C# PoC implementation for bypassing AMSI via in memory patching☆65Updated 4 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Updated 5 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆119Updated 4 years ago
- Convert PE files to a shellcode☆75Updated 5 years ago
- dem sharp donuts☆196Updated 2 years ago