FSecureLABS / SharpClipHistoryLinks
SharpClipHistory is a .NET application written in C# that can be used to read the contents of a user's clipboard history in Windows 10 starting from the 1809 Build.
☆199Updated 5 years ago
Alternatives and similar repositories for SharpClipHistory
Users that are interested in SharpClipHistory are comparing it to the libraries listed below
Sorting:
- SMBExec C# module☆216Updated 5 years ago
- ☆209Updated 5 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆132Updated 7 years ago
- WMI Event Subscription Persistence in C#☆113Updated 6 years ago
- SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.☆93Updated 4 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Updated 6 years ago
- CSHARP DCOM Fun☆134Updated 6 years ago
- Various Aggressor Scripts I've Created.☆151Updated 3 years ago
- .NET 4.0 Project to interact with video, audio and keyboard hardware.☆218Updated 5 years ago
- Cobalt Strike Aggressor Scripts☆143Updated 9 months ago
- A little tool to play with Kerberos.☆66Updated 2 years ago
- .NET 4.0 WinRM API Command Execution☆165Updated 5 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆118Updated 5 years ago
- Search files for extensions as well as text within.☆120Updated 3 years ago
- Cobalt Strike Aggressor extension for Visual Studio Code☆136Updated last year
- ☆113Updated 5 years ago
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆202Updated 4 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆196Updated 6 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆195Updated 5 years ago
- Lateral Movement technique using DCOM and HTA☆236Updated 2 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Updated 5 years ago
- Computer object takeover through Resource-Based Constrained Delegation (msDS-AllowedToActOnBehalfOfOtherIdentity)☆193Updated 4 years ago
- Create a minidump of the LSASS process from memory☆262Updated 2 years ago
- ☆193Updated 5 years ago
- Run shellcode from resource☆260Updated 4 years ago
- Malleable C2 profiles for Cobalt Strike☆74Updated 3 years ago
- Basic password spraying tool for internal tests and red teaming☆91Updated 5 years ago
- A tool to run .Net DLLs from the command line☆101Updated 6 years ago
- Evading WinDefender ATP credential-theft☆255Updated 5 years ago
- CobaltStrike External C2 for Websockets☆197Updated 6 years ago