appsecco / winmanipulateLinks
A simple tool to manipulate window objects in Windows
☆44Updated 8 years ago
Alternatives and similar repositories for winmanipulate
Users that are interested in winmanipulate are comparing it to the libraries listed below
Sorting:
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- SysCon14 release☆53Updated 8 years ago
- Alphanumeric Encoder☆25Updated 6 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆31Updated 9 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65Updated 6 years ago
- Reflective Polymorphism☆106Updated 7 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Updated 10 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- Pypykatz agent implemented in .NET☆84Updated 6 years ago
- A python based library to interact with .net webservices with net.tcp binding. Supports MC-NMF, MC-NMFTB and MS-NNS and contains a proxy …☆57Updated 5 years ago
- ☆64Updated 9 years ago
- ☆100Updated 3 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Updated 4 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆46Updated 9 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆139Updated 8 years ago
- A Generic Windows Memory Scraping Tool☆71Updated 8 years ago
- ☆30Updated 6 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Updated 7 months ago
- ☆83Updated 9 years ago
- Issues to consider when planning a red team exercise.☆15Updated 8 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 8 years ago
- ☆13Updated 9 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- CANAPE Network Testing Tool☆34Updated 7 years ago
- ☆58Updated 4 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆62Updated 8 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆60Updated 6 years ago