Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.
☆12Jan 3, 2019Updated 7 years ago
Alternatives and similar repositories for TokenContextManipulation
Users that are interested in TokenContextManipulation are comparing it to the libraries listed below
Sorting:
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- ☆33Aug 10, 2019Updated 6 years ago
- Source code for '.NET IL Assembler' by Serge Lidin☆21Mar 28, 2017Updated 8 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Nov 6, 2019Updated 6 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117May 23, 2019Updated 6 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆26Jun 13, 2019Updated 6 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- ☆208May 1, 2020Updated 5 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Dec 27, 2017Updated 8 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Nov 2, 2013Updated 12 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- Inject Frida-Gadget into a local process☆26Jul 5, 2019Updated 6 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Aug 23, 2021Updated 4 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Credential Dumper☆79Feb 19, 2020Updated 6 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- few months old but better than nothing☆58Feb 11, 2022Updated 4 years ago
- Program to leak anti-virus behaviour and such☆14Apr 18, 2019Updated 6 years ago