☆47Apr 2, 2022Updated 3 years ago
Alternatives and similar repositories for SecurePreferencesFile
Users that are interested in SecurePreferencesFile are comparing it to the libraries listed below
Sorting:
- A proof-of-concept malicious Chrome extension☆92Jul 19, 2022Updated 3 years ago
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- Silently Install Chrome Extension For Persistence☆100Jul 20, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- Lockless BOF☆79May 2, 2025Updated 10 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 6 months ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 11 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- Demo of LoadLibrary function with C++ in Win32 API☆11Jul 12, 2023Updated 2 years ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- ☆79Aug 5, 2024Updated last year
- Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.☆171Jan 25, 2024Updated 2 years ago
- Python module for running BOFs☆80Nov 28, 2025Updated 3 months ago
- ☆42Feb 18, 2025Updated last year
- An offensive toolkit for restless guests #DEFCON33☆53Aug 11, 2025Updated 7 months ago
- x64 version☆36Oct 8, 2021Updated 4 years ago
- A self-hosted Armory implementation.☆22Jan 1, 2026Updated 2 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- Timestomp Tool to flatten MAC times with a specific timestamp☆50Dec 7, 2025Updated 3 months ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆122Jul 2, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆31Jan 30, 2025Updated last year
- A port of FuzzySecurity's UrbanBishop project for inline shellcode execution☆118Sep 29, 2020Updated 5 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- ☆61Oct 24, 2025Updated 4 months ago
- ☆55May 31, 2025Updated 9 months ago
- Slides and resources from MCTTP 2025 Talk☆67Oct 26, 2025Updated 4 months ago
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- Simple EDR that injects a DLL into a process to place a hook on specific Windows API☆97Aug 27, 2023Updated 2 years ago
- ☆37Mar 28, 2020Updated 5 years ago
- ForsHops☆152Mar 25, 2025Updated 11 months ago
- ☆14Sep 26, 2023Updated 2 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- Spoofing desktop login applications with WinForms and WPF☆177Feb 19, 2024Updated 2 years ago
- ☆59Oct 24, 2024Updated last year