MortenSchenk / Babuska-DollsView external linksLinks
☆24Feb 19, 2017Updated 8 years ago
Alternatives and similar repositories for Babuska-Dolls
Users that are interested in Babuska-Dolls are comparing it to the libraries listed below
Sorting:
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Mar 6, 2017Updated 8 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- Windows Crypt API hook to generate weak keys☆47Nov 1, 2016Updated 9 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- A realistic windows testlab deployment tool☆12Feb 24, 2017Updated 8 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago
- ☆409Mar 1, 2017Updated 8 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- The Windows driver and device management program for NDAS devices such as the NetDISK.☆16Jun 17, 2016Updated 9 years ago
- ☆20Feb 6, 2024Updated 2 years ago
- ☆12Feb 19, 2017Updated 8 years ago
- My masters degree dissertation for ISG, Royal Holloway (2011) on evolutionary fuzzing☆11Jul 22, 2016Updated 9 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 8 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆341Jul 30, 2017Updated 8 years ago
- Collection of scripts to Invoke an expression with different credentials.☆35Jun 2, 2021Updated 4 years ago
- ☆54Feb 27, 2017Updated 8 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Final Transparent encrypted version☆14Jan 10, 2017Updated 9 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- File encryption based on DES and blowfish☆15May 29, 2025Updated 8 months ago
- This project has been moved from a private repository.☆11May 4, 2018Updated 7 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- ☆55Jul 18, 2017Updated 8 years ago
- Kernel-mode file scanner☆19Jul 16, 2018Updated 7 years ago
- Cobalt Strike Aggressor extension for Visual Studio Code☆138Jun 20, 2024Updated last year
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Jun 11, 2015Updated 10 years ago