billchaison / Windows-Trix
Various techniques for exploiting Windows
☆10Updated 11 months ago
Related projects: ⓘ
- ☆8Updated 3 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆15Updated 3 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆11Updated 7 years ago
- The hidden mstsc recorder player☆28Updated 4 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆22Updated 3 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- module for certexfil☆15Updated 2 years ago
- ☆38Updated this week
- Windows SSPI wrapper in prue python☆15Updated 9 months ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- ☆17Updated last year
- Grepify the GUI Regex Text Scanner for Code Reviewers☆22Updated 11 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆11Updated 4 years ago
- Local Privilege Escalation Miner☆22Updated 2 years ago
- Windows productivity tweaks☆14Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 7 years ago
- Dump Windows registry hives as text.☆15Updated 5 years ago
- ☆10Updated this week
- TCP reverse shell written in C# with the option to choose between Windows command prompt or MS powershell.☆26Updated 5 years ago
- ☆15Updated 6 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆15Updated 6 years ago
- Password reader for Mozilla Firefox and Thunderbird☆23Updated 4 years ago
- Automatic generator of YARA modules based in protocol buffers☆14Updated last week
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- ☆10Updated this week
- Dump certificates from PE files in different formats☆36Updated 8 months ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago