JkMaFlLi / xorInject
☆19Updated 5 months ago
Alternatives and similar repositories for xorInject:
Users that are interested in xorInject are comparing it to the libraries listed below
- Tool to aid in dumping LSASS process remotely☆38Updated 8 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 10 months ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 2 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- ☆48Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- DFSCoerce exe revisited version with custom authentication☆39Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- Reasonably undetected shellcode stager and executer.☆37Updated 7 months ago
- Sniffing files generator☆54Updated last month
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 6 months ago
- Tool to obtain hash using MS-SNTP for user accounts☆21Updated 2 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆44Updated last year
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆18Updated 2 months ago
- ☆18Updated 4 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- SAM Dumping in C#☆48Updated 3 months ago
- in-process powershell runner for BRC4☆45Updated last year
- Validates priv escalation of AD trusts☆39Updated 2 weeks ago
- ☆16Updated last year
- ☆17Updated 6 months ago
- A simple website to act as a store for havoc modules and extensions☆26Updated 3 months ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆21Updated 10 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆41Updated 8 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆20Updated 2 weeks ago
- ☆34Updated 3 months ago
- ☆26Updated 2 months ago