S3cur3Th1sSh1t / Sharp-HackBrowserData
C# binary with embeded golang hack-browser-data
☆96Updated 3 years ago
Alternatives and similar repositories for Sharp-HackBrowserData
Users that are interested in Sharp-HackBrowserData are comparing it to the libraries listed below
Sorting:
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆59Updated 3 years ago
- C# program to take a full size screenshot or a recording of the user's desktop. Takes in 0-3 flags☆86Updated 4 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆69Updated 2 years ago
- HackBrowserData的反射模块☆175Updated 4 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆82Updated 2 years ago
- A small (Edited) POC to make defender useless by removing its token privileges and lowering the token integrity☆32Updated 2 years ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆65Updated 10 months ago
- Windows shellcode encoding and encrypting tool☆21Updated 3 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆138Updated 2 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆140Updated 3 years ago
- use aswArPot.sys to kill process☆67Updated 2 years ago
- ☆42Updated last year
- Beacon Object File implementation of pwn1sher's KillDefender☆66Updated 2 years ago
- ☆52Updated 3 years ago
- AutoStart teamserver and listeners with services☆73Updated 3 years ago
- Load shellcode via syscall☆53Updated 3 years ago
- Use CMSTP.exe to bypass UAC.☆43Updated 2 years ago
- Simple LSASS Dumper created using C++ as an alternative to using Mimikatz memory dumper☆54Updated last year
- (Hellsgate|Halosgate|Tartarosgate)+Spoofing-Gate. Ensures that all systemcalls go through ntdll.dll☆43Updated 3 years ago
- LOLBINs that inject a DLL into a given process ID.☆138Updated 3 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- CVE-2021-1675 (PrintNightmare)☆76Updated 3 years ago
- A Cobalt Strike memory evasion loader for redteamers☆99Updated 2 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆88Updated 2 years ago
- Encrypting shellcode to Bypass AV☆71Updated 6 years ago
- ReturnGate, just like HellsGate.☆66Updated 2 years ago
- MappingInjection via csharp☆38Updated 3 years ago
- my learning case about windows☆21Updated 3 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆133Updated 3 years ago