RUB-NDS / MS-RMS-AttacksLinks
Breaking the security of Microsoft's RMS
☆56Updated 6 years ago
Alternatives and similar repositories for MS-RMS-Attacks
Users that are interested in MS-RMS-Attacks are comparing it to the libraries listed below
Sorting:
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Updated 8 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- Windows DPAPI laboratory☆94Updated 7 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- Decrypt NTDS hashes☆23Updated 12 years ago
- ☆52Updated 7 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- ☆65Updated 9 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆62Updated 8 years ago
- This is a Python port of lnk-parse-1.0, a tool to parse Windows .lnk files.☆80Updated 2 years ago
- A sample bot for Cobalt Strike 3☆22Updated 9 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Updated 9 years ago
- Powershell Persistence Locator☆66Updated 9 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38Updated 6 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- ☆19Updated 8 years ago
- A Generic Windows Memory Scraping Tool☆71Updated 8 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Updated 11 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- An offensive Powershell console☆30Updated 10 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆139Updated 8 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 8 years ago
- ☆26Updated 9 years ago
- Certificate Export Utility☆26Updated 5 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Updated 8 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 9 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Updated 9 years ago