☆60Dec 20, 2023Updated 2 years ago
Alternatives and similar repositories for MonkeyWorks
Users that are interested in MonkeyWorks are comparing it to the libraries listed below
Sorting:
- SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.☆93Feb 15, 2021Updated 5 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- A tool to run .Net DLLs from the command line☆105Oct 23, 2018Updated 7 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- ☆33Aug 10, 2019Updated 6 years ago
- .NET tool for enumeration processes and dumping memory.☆57Apr 4, 2019Updated 6 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- External C2 Using IE COM Objects☆101Feb 24, 2019Updated 7 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- ☆110May 14, 2018Updated 7 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- Simple packer for arbitrary data using only .NET API calls. Produces a unique signature with every usage. Standalone program and library.…☆94Apr 27, 2019Updated 6 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆231May 30, 2019Updated 6 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆13Aug 9, 2020Updated 5 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- WMI Event Subscription Persistence in C#☆112May 29, 2019Updated 6 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆195Jun 30, 2019Updated 6 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- Keylogger written in C#☆125Dec 13, 2019Updated 6 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- SMBExec C# module☆219Aug 21, 2020Updated 5 years ago