Iansus / DllProxyLinks
☆17Updated last year
Alternatives and similar repositories for DllProxy
Users that are interested in DllProxy are comparing it to the libraries listed below
Sorting:
- Extension functionality for the NightHawk operator client☆27Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A simple rpc2socks alternative in pure Go.☆28Updated 10 months ago
- Beacon Object Files used for Cobalt Strike☆19Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- ☆19Updated last year
- A simple to use single-include Windows API resolver☆21Updated 10 months ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated last year
- ☆23Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- The Totally Legit Authentication Dialog☆12Updated last year
- ☆48Updated 2 years ago
- ☆12Updated 2 years ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated last month
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- OSED Practice binary☆24Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- ☆30Updated 2 years ago
- ☆25Updated 2 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆18Updated 2 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Updated 3 years ago
- Some of my custom "tools".☆23Updated 3 years ago
- Tool for pivoting over SMB pipes☆17Updated 5 years ago
- Tools for Attacking Pleasant Password Server☆22Updated last year