Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series
☆107Jan 9, 2024Updated 2 years ago
Alternatives and similar repositories for BetaFast
Users that are interested in BetaFast are comparing it to the libraries listed below
Sorting:
- Damn Vulnerable Thick Client App developed in C# .NET☆176Aug 17, 2023Updated 2 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆26Oct 25, 2020Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- DAFT: Database Audit Framework & Toolkit☆182Aug 11, 2021Updated 4 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Damn Vulnerable Thick Client App☆155Jul 16, 2020Updated 5 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- MSBuild without MSbuild.exe☆135Dec 21, 2020Updated 5 years ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- ☆64Jan 17, 2026Updated last month
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- Penetration Testing Azure for Ethical Hackers, published by Packt☆114Dec 19, 2024Updated last year
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Feb 9, 2020Updated 6 years ago
- A collection of simple tools and poc-builders☆39Jul 22, 2025Updated 7 months ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Jun 6, 2023Updated 2 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- Damn Vulnerable Java (EE) Application☆145Jan 23, 2024Updated 2 years ago
- ☆60Mar 28, 2020Updated 5 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- Information Security Information From Web☆28Jul 31, 2025Updated 7 months ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆46Mar 1, 2021Updated 5 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆251Sep 26, 2020Updated 5 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆117Dec 26, 2021Updated 4 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- ☆20Oct 7, 2013Updated 12 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- DLL Hijacking Detection Tool☆542Aug 6, 2019Updated 6 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- A collection of scripts for assessing Microsoft Azure security☆2,309Oct 29, 2025Updated 4 months ago
- ☆127Jun 19, 2020Updated 5 years ago