My take on the Win10 Task Cleaner UAC bypass.
☆19Mar 14, 2019Updated 7 years ago
Alternatives and similar repositories for Invoke-TaskCleanerBypass
Users that are interested in Invoke-TaskCleanerBypass are comparing it to the libraries listed below
Sorting:
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- A comprehensive Delphi implementation of reverse SSH tunneling with integrated SOCKS5 proxy capabilities, enabling secure remote access t…☆16Mar 10, 2026Updated last week
- MorMot V2 TAsyncServer and TAsyncClient Multiple Connections Example☆14Mar 10, 2026Updated last week
- Tool for dictionary attack with fail2ban bypass.☆10May 17, 2018Updated 7 years ago
- TProcess for Delphi☆12Jun 17, 2023Updated 2 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Remote Administration Tool made in golang language.☆11Aug 7, 2023Updated 2 years ago
- Windows Privilege Escalation☆18Jun 11, 2022Updated 3 years ago
- Windows Malware monitors and infects specific kinds of files.☆18Sep 24, 2019Updated 6 years ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆15Dec 10, 2019Updated 6 years ago
- The New Hacking Framework☆18Apr 26, 2017Updated 8 years ago
- PowerShell Pass The Hash Utils☆16Dec 9, 2018Updated 7 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- ThreatTrack | Shodan + ExploitDB + GitHub + NVD☆17Jul 16, 2024Updated last year
- Tool to perform brute force attack on TPLink routers☆16Jun 12, 2019Updated 6 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Feb 11, 2025Updated last year
- ☆14Aug 30, 2024Updated last year
- Battery-free emulator of the well-known iButton key based on ATtiny13.☆16Aug 25, 2024Updated last year
- ☆11Jul 16, 2017Updated 8 years ago
- Tools about security.txt for Ruby☆20Oct 14, 2023Updated 2 years ago
- Screen capture☆22Dec 9, 2024Updated last year
- Intellij support for Crystal Lang (Help wanted)☆13Feb 6, 2017Updated 9 years ago
- Arya is a simple obfuscator for .NET binaries.☆37Dec 11, 2017Updated 8 years ago
- Detect the server side language used for the website☆13Mar 23, 2021Updated 4 years ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- A druby protocol of WebSocket☆15Apr 14, 2025Updated 11 months ago
- Ruby Bind and Reverse Shells I wrote using standard libs. Bind Shell includes authentication while reverse does not. Standard libs only s…☆12Aug 2, 2013Updated 12 years ago
- C# Codedom example / builder☆24Mar 8, 2020Updated 6 years ago
- - THIS IS AN OLD FORK - Checkout Medusa Crawler gem instead "medusa-crawler"☆16Aug 5, 2020Updated 5 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆65Aug 17, 2019Updated 6 years ago
- ☆17Aug 17, 2024Updated last year
- gdbperl for Ruby☆46Nov 8, 2016Updated 9 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- Tiny simple interception tool for TP-LINK "Easy Smart"-managed device configuration using the TP-LINK "Easy Smart Configuration Utility"☆12Sep 5, 2017Updated 8 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- This library allows you to track the commits from the facepunch site.☆10Mar 30, 2023Updated 2 years ago
- File uploader frontend☆35Updated this week