Synzack / Excel-4.0-Shellcode-Generator
☆13Updated 4 years ago
Alternatives and similar repositories for Excel-4.0-Shellcode-Generator:
Users that are interested in Excel-4.0-Shellcode-Generator are comparing it to the libraries listed below
- ☆29Updated 2 years ago
- A method to execute shellcode using RegisterWaitForInputIdle API.☆52Updated 2 years ago
- Parses Cobalt Strike malleable C2 profiles.☆56Updated last week
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆27Updated 4 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- ☆25Updated 3 years ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆55Updated 2 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- Extended Process List (Search functionality)☆29Updated 4 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆62Updated 3 years ago
- ☆38Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- A care package of useful bofs for red team engagments☆55Updated 4 months ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 4 years ago
- ☆43Updated last year
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆18Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated last year
- ProcExp Driver (Ab)use☆21Updated 2 years ago
- .NET project for installing Persistence☆64Updated 3 years ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆38Updated last year
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 3 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆15Updated 2 years ago
- ☆20Updated 10 months ago
- Laz-y project compatible C# templates for shellcode injection.☆20Updated 2 years ago
- IOXIDResolver from AirBus Security/PingCastle☆50Updated 4 years ago
- Tool to start processes as SYSTEM using token duplication☆38Updated 4 years ago
- Click Once + App Domain☆61Updated last year
- ☆21Updated last year