VolatileMindsLLC / metasploit-sharpLinks
C# bindings for the Metasploit RPC
☆21Updated 8 years ago
Alternatives and similar repositories for metasploit-sharp
Users that are interested in metasploit-sharp are comparing it to the libraries listed below
Sorting:
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- BoutDuTunnel is able to create virtual connections tunnelled in HTTP requests.☆99Updated 4 years ago
- Open source exploit framework made in C#☆54Updated 7 months ago
- Searches for strings, regex, credit card numbers of magnetic stripe card tracks in a Windows process's memory space☆125Updated 4 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆45Updated 2 years ago
- A Remote Administration Tool coded in C#☆20Updated 13 years ago
- In memory attack platform for C# Applications☆53Updated 6 years ago
- A PowerShell binding for the Unicorn Engine☆17Updated 9 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 10 years ago
- An Advanced Web Crawler and DirBuster☆113Updated 3 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆53Updated 10 years ago
- A Generic Windows Memory Scraping Tool☆71Updated 8 years ago
- PowerShell Runspace Connect-Back Shell☆26Updated 9 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated 2 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Updated 10 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Updated 7 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Updated 10 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Updated 9 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 11 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆68Updated 7 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆106Updated 10 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆130Updated 8 years ago
- A simple shellcode runner☆21Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Projects and POCs☆60Updated 11 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆118Updated 2 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Updated 12 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆46Updated 9 years ago