NullArray / WinBins-PlusLinks
Repo to store Windows PE's and Utilities for easy access.
☆16Updated 4 years ago
Alternatives and similar repositories for WinBins-Plus
Users that are interested in WinBins-Plus are comparing it to the libraries listed below
Sorting:
- module for certexfil☆15Updated 2 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Updated 7 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- ☆11Updated 4 years ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- Basic multi platform meterpreter loader module.☆15Updated 4 years ago
- A reduced functionality cli client for the imdisk ram disk driver. To be used through a backdoor like meterpreter☆22Updated 6 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- ☆20Updated 5 years ago
- ☆17Updated 4 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- ☆45Updated 7 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 5 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Simulates a logged in user.☆16Updated 11 months ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆11Updated 9 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated 9 months ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago