WingsOfDoom / ICUView external linksLinks
quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a37194971a5e944f22c94df7c/CredentialUI.cs
☆31Jun 12, 2020Updated 5 years ago
Alternatives and similar repositories for ICU
Users that are interested in ICU are comparing it to the libraries listed below
Sorting:
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 5 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆54Jul 11, 2021Updated 4 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- C# project to create or modify existing LNKs☆54Oct 18, 2022Updated 3 years ago
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 3 years ago
- ☆180Feb 3, 2021Updated 5 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- VBScript minifier☆25Jan 9, 2026Updated last month
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- CSHARP DCOM Fun☆138Sep 16, 2019Updated 6 years ago
- Evading WinDefender ATP credential-theft☆256Dec 2, 2019Updated 6 years ago
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Collection of beacon object files for use with Cobalt Strike to facilitate 🐚.☆185Feb 11, 2021Updated 5 years ago
- Use to browse the share file by eas(Exchange Server ActiveSync)☆46Jun 28, 2020Updated 5 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- ☆133Dec 19, 2020Updated 5 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆46Mar 1, 2021Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆244Jul 14, 2021Updated 4 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆107Feb 12, 2023Updated 3 years ago
- SysCon14 release☆55Jun 24, 2017Updated 8 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Nov 4, 2020Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- A collection of various tools for red-teaming exercises. A mix of C#, Powershell, & Python☆108Jul 26, 2024Updated last year
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago