VolatileMindsLLC / metasploit-sharpLinks
C# bindings for the Metasploit RPC
☆20Updated 9 years ago
Alternatives and similar repositories for metasploit-sharp
Users that are interested in metasploit-sharp are comparing it to the libraries listed below
Sorting:
- BoutDuTunnel is able to create virtual connections tunnelled in HTTP requests.☆97Updated 4 years ago
- Open source exploit framework made in C#☆54Updated 10 months ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Updated 8 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 9 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Updated 2 years ago
- Searches for strings, regex, credit card numbers of magnetic stripe card tracks in a Windows process's memory space☆124Updated 4 years ago
- A PowerShell binding for the Unicorn Engine☆17Updated 9 years ago
- A Remote Administration Tool coded in C#☆20Updated 13 years ago
- Windows Remote Access Trojan (RAT)☆86Updated 10 years ago
- An Advanced Web Crawler and DirBuster☆114Updated 3 years ago
- A collection of publicly released whitepapers☆49Updated 8 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆54Updated 11 years ago
- FxCop rules that aim to help security audit on .NET applications.☆14Updated 8 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆33Updated 7 years ago
- A modular distributed penetration testing tool.☆41Updated 8 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆68Updated 7 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 11 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 8 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Updated 11 years ago
- Exploits used on hacking CTF's☆28Updated 6 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 4 years ago
- Tool designed to study the answers of your DNS resolver and make easier the identification of techniques such as DNS Hijacking/Poisoning☆27Updated 6 years ago
- MS15-076 Privilege Escalation☆101Updated 10 years ago
- Elevation by environment variable expansion☆65Updated 9 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆130Updated 9 years ago