clr2of8 / CookieCrimesJSView external linksLinks
A cross-platform one-liner to steal a user's cookies from Chrome <- cool
☆87Nov 21, 2018Updated 7 years ago
Alternatives and similar repositories for CookieCrimesJS
Users that are interested in CookieCrimesJS are comparing it to the libraries listed below
Sorting:
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Oct 19, 2019Updated 6 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Dec 12, 2019Updated 6 years ago
- Disabling Windows Defender & downloading payload☆21Jul 28, 2020Updated 5 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- an evil chrome extension that steals credentials from form inputs☆27Aug 5, 2020Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- Cookie Stealer for USB Drive☆30Oct 12, 2021Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65May 24, 2019Updated 6 years ago
- Steals chrome and firefox cookies and upload to the server using POST api.☆10May 3, 2016Updated 9 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Aug 8, 2024Updated last year
- Embedding a "UAC-Bypassing" function into your custom payload☆98Aug 13, 2022Updated 3 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- python scripts for penetration testing☆11Oct 17, 2019Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- Constrained Language Mode + AMSI bypass all in one☆158Jul 29, 2019Updated 6 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Feb 27, 2025Updated 11 months ago
- using VBS to download and install a powershell malware☆39Jun 28, 2019Updated 6 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 3 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Feb 18, 2019Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 4 years ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- extracts shellcode from a nasm compile macho binary☆16Jan 28, 2021Updated 5 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆65Aug 17, 2019Updated 6 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- ☆94Nov 1, 2018Updated 7 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Apr 29, 2019Updated 6 years ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆141Mar 10, 2021Updated 4 years ago
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 6 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- A proof of concept for dynamically loading .net assemblies at runtime with only a minimal convention pre-knowledge☆164Jul 25, 2018Updated 7 years ago
- The full story of the CLR implementation of Meterpreter☆153Jul 29, 2020Updated 5 years ago
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆64Nov 22, 2019Updated 6 years ago