arntsonl / calc_security_poc
A sample of proof of concept scripts that run Calc.exe with full source code.
☆89Updated 2 weeks ago
Related projects: ⓘ
- Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.☆199Updated 7 years ago
- Presentation material presented by Outflank team members at public events.☆177Updated 3 months ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆237Updated 4 years ago
- Lateral Movement technique using DCOM and HTA☆228Updated last year
- ☆161Updated last year
- Run Rubeus via Rundll32☆193Updated 4 years ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆244Updated 3 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆166Updated 4 years ago
- An Insider Threat Toolkit☆149Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆105Updated 4 years ago
- Code Exec via Excel☆83Updated 7 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆213Updated 4 years ago
- This code was used for the blogpost on secjuice.☆40Updated 5 years ago
- Scripts for performing and detecting parent PID spoofing☆136Updated 4 years ago
- lateral movement techniques that can be used during red team exercises☆265Updated 4 years ago
- Neutering Sysmon via driver unload☆219Updated last year
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆147Updated 5 years ago
- Evading WinDefender ATP credential-theft☆251Updated 4 years ago
- (kinda) Malicious Outlook Reader☆132Updated 3 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆127Updated last year
- A HTA shell to assist with breakout assessments.☆112Updated 2 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆92Updated 2 years ago
- Create a minidump of the LSASS process from memory☆254Updated last year
- Tools for discovery and abuse of COM hijacks☆282Updated 4 years ago
- Constrained Language Mode + AMSI bypass all in one☆152Updated 5 years ago
- Loads a custom dll in system32 via diaghub.☆64Updated 4 years ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆219Updated 4 years ago
- CSHARP DCOM Fun☆120Updated 5 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆171Updated 5 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆143Updated 4 years ago