blacklanternsecurity / mklnk
Create a lnk shortcut file for Windows
☆15Updated 5 years ago
Alternatives and similar repositories for mklnk:
Users that are interested in mklnk are comparing it to the libraries listed below
- C# project to Reflectively load .Net assemblies in memory☆17Updated 8 months ago
- ☆24Updated 3 years ago
- Smuggle a file to a user's browser☆19Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆13Updated 5 months ago
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆11Updated 3 years ago
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- Extension functionality for the NightHawk operator client☆26Updated last year
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆28Updated 3 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆19Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆13Updated 2 years ago
- ☆16Updated 4 months ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- load dumped csharp binaries as assemblies and launch them in memory☆26Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆18Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆20Updated 2 years ago
- ☆47Updated 2 years ago
- Tool to aid in dumping LSASS process remotely☆38Updated 7 months ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 3 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 4 years ago
- A PoC for achieving persistence via push notifications on Windows☆46Updated last year