MalwareTech / HiddenDesktop
Create and enumerate hidden desktops.
☆88Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for HiddenDesktop
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- ☆105Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆105Updated 6 months ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 4 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆80Updated 9 months ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆103Updated last year
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆127Updated last year
- ☆156Updated last year
- An interactive shell to spoof some LOLBins command line☆180Updated 9 months ago
- Just some random Red Team Scripts that can be useful☆135Updated 4 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆79Updated 4 months ago
- Spoofing desktop login applications with WinForms and WPF☆170Updated 9 months ago
- My Favorite Offensive Security Scripts☆63Updated last year
- 「💀」Proof of concept on BYOVD attack☆150Updated 8 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆45Updated 8 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 5 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆91Updated last year
- ☆104Updated this week
- linikatz is a tool to attack AD on UNIX☆138Updated last year
- ☆105Updated 9 months ago
- ☆126Updated 3 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated last year
- Evade EDR's the simple way, by not touching any of the API's they hook.☆52Updated 3 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆145Updated 11 months ago
- Just another C2 Redirector using CloudFlare.☆78Updated 6 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆57Updated 5 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆190Updated 5 months ago