A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as the NT AUTHORITY/SYSTEM account
☆100Aug 24, 2019Updated 6 years ago
Alternatives and similar repositories for BITSInject
Users that are interested in BITSInject are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Oct 10, 2019Updated 6 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- A simple python implementation of a BITS server.☆105Mar 6, 2022Updated 4 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Nov 29, 2017Updated 8 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆89Jul 30, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A WebDAV PROPFIND C2 tool☆120Aug 27, 2019Updated 6 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- Sample showing the use of CoGetInterceptor☆22Mar 27, 2021Updated 5 years ago
- The Alternative Fileless File System☆57Apr 4, 2019Updated 6 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆19Apr 20, 2016Updated 9 years ago
- ☆113Jun 12, 2017Updated 8 years ago
- lowlevel cyber course - riscv & i8086 competition☆11Jan 12, 2019Updated 7 years ago
- ☆108Mar 21, 2017Updated 9 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Apr 5, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆308Oct 27, 2017Updated 8 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- This is a PowerShell based tool that is designed to act like a RAT. Its interface is that of a shell where any command that is supported …☆845Jun 25, 2024Updated last year
- morphHTA - Morphing Cobalt Strike's evil.HTA☆527Apr 14, 2023Updated 2 years ago
- An attempt to reverse-engineer the protocol for Diablo III, allowing a MITM attack on the game by intercepting packets as they pass throu…☆13Jun 21, 2012Updated 13 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆23Oct 6, 2017Updated 8 years ago
- ☆22May 25, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆127Sep 19, 2017Updated 8 years ago
- Tool to make in memory man in the middle☆125Oct 8, 2018Updated 7 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Material from our CANAPE workshop☆32Nov 26, 2018Updated 7 years ago
- Exploit primitives for PowerShell☆436Mar 25, 2018Updated 8 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆33Jul 19, 2021Updated 4 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- CVE-2017-7269 to webshell or shellcode loader☆88May 16, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Powershell VNC injector☆340Jun 29, 2020Updated 5 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Lists work items being queued currently.☆15Jun 7, 2015Updated 10 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆231May 30, 2019Updated 6 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- OFFICE DDEAUTO Payload Generation script☆128Dec 19, 2020Updated 5 years ago