barakolo / Maltensions
Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".
☆10Updated 3 years ago
Alternatives and similar repositories for Maltensions:
Users that are interested in Maltensions are comparing it to the libraries listed below
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- Compiled Binaries for Sharp Suite☆14Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆21Updated 6 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Updated 3 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 2 years ago
- A little implant which SSH's back with a shell☆37Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- ☆15Updated 3 years ago
- AMSI detection PoC☆31Updated 5 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Updated 3 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- ☆23Updated 3 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Updated 4 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- ☆18Updated 4 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- ☆19Updated 4 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 5 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Updated last year
- Tool for pivoting over SMB pipes☆17Updated 5 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆17Updated 3 years ago
- Very Easy Relative Backdoor Application☆12Updated 3 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆34Updated 3 years ago