abatchy17 / Introduction-To-Manual-BackdooringLinks
Executables created while writing "Introduction to Manual Backdooring".
☆80Updated 8 years ago
Alternatives and similar repositories for Introduction-To-Manual-Backdooring
Users that are interested in Introduction-To-Manual-Backdooring are comparing it to the libraries listed below
Sorting:
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- This repo is all about myself coded exploit codes :)☆55Updated 5 years ago
- Platform independent peCloak fork based on Capstone☆106Updated 9 years ago
- Simple tool to automate adding shellcode to PE files☆49Updated 7 years ago
- The Ultimate Guide to Pwning☆58Updated 7 years ago
- VBA Reversed TCP Meterpreter Stager☆63Updated 7 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆53Updated 10 years ago
- CVE-2018-8440 standalone exploit☆79Updated 6 years ago
- VBS Reversed TCP Meterpreter Stager☆88Updated 8 years ago
- JavaScript Reversed TCP Meterpreter Stager☆137Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- ☆21Updated 8 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆60Updated 8 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- ☆36Updated 7 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆102Updated 7 years ago
- PoC dlls for Task Scheduler COM Hijacking☆94Updated 8 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 2 years ago
- InfoPath Phishing Repo Resource☆69Updated 7 years ago
- UAC 0Day all day!☆57Updated 7 years ago
- Windows Reverse Shell shellcode☆61Updated 3 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆106Updated 7 years ago
- some pocs for antivirus evasion☆131Updated last year
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Miscellaneous projects related to attacking Windows.☆28Updated 6 years ago
- Slides from previous conference talks☆41Updated 8 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 7 years ago
- public exploits☆35Updated 2 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆129Updated 8 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago