Make Windows LNK file with python (pylnk)
☆64Jun 4, 2016Updated 9 years ago
Alternatives and similar repositories for python_lnk_maker
Users that are interested in python_lnk_maker are comparing it to the libraries listed below
Sorting:
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆71Oct 19, 2017Updated 8 years ago
- A Windows Event Processing Utility☆47Feb 21, 2018Updated 8 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- ☆113Jun 12, 2017Updated 8 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆163Apr 11, 2017Updated 8 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- ☆84May 19, 2015Updated 10 years ago
- Liniaal - A communication extension to Ruler☆99Aug 22, 2018Updated 7 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆32Nov 11, 2014Updated 11 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- ☆164Aug 28, 2015Updated 10 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- Various DFIR Tools☆27Jul 23, 2018Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Image size issues plugin for Burp Suite☆95Jun 27, 2018Updated 7 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆170Mar 7, 2018Updated 8 years ago
- DLL to use the power of Pafish☆32Oct 5, 2021Updated 4 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆114Dec 19, 2020Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- ☆121Oct 6, 2015Updated 10 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- Python wrapper for the whitepages api. For more information about the whitepages api see their documentation at http://pro.whitepages.com…☆12Apr 27, 2015Updated 10 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago