ACTIVELabs Security Advisories
☆24May 19, 2021Updated 4 years ago
Alternatives and similar repositories for Advisories
Users that are interested in Advisories are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- ☆16Dec 14, 2017Updated 8 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- Perform packet-process correlation on Windows using the Windows equivalent of the Linux sensor.☆25Sep 23, 2015Updated 10 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 7 years ago
- ERPScan Public POC for CVE-2018-2636☆22Feb 1, 2018Updated 8 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago
- CVE-2018-15982_PoC☆14Nov 6, 2019Updated 6 years ago
- 常用系统服务默认端口列表☆13Apr 25, 2017Updated 8 years ago
- collection of scripts and stuff☆12Aug 15, 2016Updated 9 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Jan 13, 2016Updated 10 years ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆201Sep 13, 2019Updated 6 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- Code for blogpost: https://outflank.nl/blog/2018/10/25/building-resilient-c2-infrastructues-using-dns-over-https/☆55Oct 25, 2018Updated 7 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Go package for fexecve(3) and execveat(2)☆15Mar 4, 2026Updated 3 weeks ago
- CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation☆83Mar 13, 2019Updated 7 years ago
- Tool that automates Active Directory enumeration☆88Apr 24, 2021Updated 4 years ago
- Metasploit reverse TCP stager fully undetectable☆18Nov 29, 2015Updated 10 years ago
- Using GNU lightning to generate xor deobfuscation at runtime☆27Aug 22, 2017Updated 8 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- Plugin to assist in reverse engineering programs that use JNI.☆12Apr 27, 2017Updated 8 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Mar 14, 2018Updated 8 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Jul 18, 2017Updated 8 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- ☆34Sep 22, 2017Updated 8 years ago