☆17Jun 28, 2023Updated 2 years ago
Alternatives and similar repositories for DllProxy
Users that are interested in DllProxy are comparing it to the libraries listed below
Sorting:
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- ☆48Feb 11, 2023Updated 3 years ago
- A C2 framework built for my bachelors thesis☆57Jan 14, 2026Updated 2 months ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- This program is used to perform reflective DLL Injection to a remote process specified by the user.☆64Jul 11, 2023Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- Set of python scripts which perform different ways of command execution via WMI protocol.☆165Jun 29, 2023Updated 2 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- ☆85Nov 21, 2024Updated last year
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆96May 9, 2023Updated 2 years ago
- Infect Shared Files In Memory for Lateral Movement☆192Dec 14, 2022Updated 3 years ago
- ☆21May 17, 2023Updated 2 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆85Feb 26, 2023Updated 3 years ago
- ☆163Oct 25, 2023Updated 2 years ago
- A collection of various and sundry code snippets that leverage .NET dynamic tradecraft☆145May 18, 2024Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆41Dec 7, 2025Updated 3 months ago
- Verilog code to let an iCE40 FPGA drive a HUB75, yet still getting pixel data from sled.☆10May 9, 2018Updated 7 years ago
- ESPHome Project for HUB75 controllers & displays☆20Updated this week
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- Experimental imgui app framework for rapid prototyping.☆14Aug 10, 2025Updated 7 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆43Jun 27, 2023Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Jan 26, 2024Updated 2 years ago
- ☆27Aug 5, 2019Updated 6 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- Retrieve host information from NTLM☆32Feb 4, 2021Updated 5 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆363Dec 19, 2022Updated 3 years ago
- Plugin to assist in reverse engineering programs that use JNI.☆12Apr 27, 2017Updated 8 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115May 21, 2023Updated 2 years ago
- The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The…☆27Jul 21, 2023Updated 2 years ago
- An open-source process injection enumeration tool written in C#☆174Dec 16, 2022Updated 3 years ago