Simon-AKA-Subliminal / Identify-Malicious-Internet-Users-Using-Tor
☆10Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for Identify-Malicious-Internet-Users-Using-Tor
- A PowerShell script to prevent Sysmon from writing its events☆14Updated 4 years ago
- ☆16Updated 6 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- PoC code from blog☆16Updated 4 years ago
- C# code to run PIC using CreateThread☆16Updated 5 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆13Updated 6 years ago
- SSDP Service Discovery☆16Updated 5 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆32Updated 4 years ago
- ☆11Updated 6 years ago
- Generic malicious browser check written in C#☆12Updated 8 years ago
- ☆24Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 3 years ago
- Python crawler for remote Windows shares☆12Updated 8 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 7 years ago
- ☆17Updated 7 years ago
- ☆26Updated 6 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆11Updated 2 years ago
- Random code snippets☆9Updated last year
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆13Updated 7 years ago
- ☆17Updated 6 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- A tool to sync mythic events with ghostwriter oplog.☆12Updated 3 years ago