Gcow-Sec / GcowPublic
☆27Updated 4 years ago
Alternatives and similar repositories for GcowPublic:
Users that are interested in GcowPublic are comparing it to the libraries listed below
- ☆50Updated 4 years ago
- Python api for usage with cobalt strike's External C2 specification☆62Updated 6 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- ☆24Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- sploit☆68Updated 5 years ago
- Community maintained list of most popular HIPS service and process names on a Windows Platform.☆43Updated 2 years ago
- Simple C implementation to perform shellcode process injection via win32 APIs☆61Updated 5 years ago
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 3 years ago
- adding a backdooruser using win32api☆80Updated 4 years ago
- Some talks about security☆13Updated 4 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆109Updated 5 years ago
- Use powershell to test Office-based persistence methods☆76Updated 3 years ago
- Everything related to Cobalt Strike☆15Updated 5 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Updated 5 years ago
- eternalrelayx☆37Updated 5 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 6 years ago
- Apache Module Backdoor (PoC)☆48Updated 5 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- A Flexible Web Shell Client, Built on Electron☆13Updated 2 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆34Updated 5 years ago
- initial commit☆43Updated 4 months ago
- I used this to see if an EDR is running in Safe Mode☆36Updated 4 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆108Updated 6 years ago
- with metasploit☆62Updated 4 years ago
- ☆44Updated 6 years ago
- ☆44Updated 4 years ago
- Sources code extracted from malwares for analysis☆36Updated 2 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆74Updated 5 years ago