coca1ne / DLL_Hijacker
DLL_Hijacker.py
☆75Updated 9 years ago
Alternatives and similar repositories for DLL_Hijacker:
Users that are interested in DLL_Hijacker are comparing it to the libraries listed below
- Search for information from manifests☆44Updated 6 years ago
- bypass uac☆142Updated 6 years ago
- ☆93Updated 3 years ago
- Penetration test☆55Updated 3 years ago
- Play Doh Windows ACL Tools☆61Updated 2 years ago
- ☆68Updated 2 years ago
- ☆32Updated 7 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆78Updated 6 years ago
- ShellCode Loader for MSF and Cobalt Strike☆54Updated 10 months ago
- ZeroRAT是一款windows上的一句话远控☆62Updated 9 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆139Updated 4 years ago
- integration ms17010 and nsa-EternalBlue☆39Updated 6 years ago
- Use subProcessTag Value From TEB to identify Event Log Threads☆84Updated 3 years ago
- it works on xp (all version sp2 sp3)☆75Updated 5 years ago
- Windows杀软对比和补丁号对比☆58Updated 5 years ago
- cknife(webshell manager)☆27Updated 7 years ago
- Web ExternalC2 Demo☆51Updated 4 years ago
- 破解CS4.0☆161Updated 5 years ago
- aggressor-script 中文翻译 aggressor-script 使用☆42Updated 7 years ago
- a pass-the-hash tool☆105Updated 7 years ago
- sSocks fork for windows support; original: https://sourceforge.net/projects/ssocks/☆42Updated 3 years ago
- My exercise of using Exchange Web Service(EWS)☆53Updated 3 years ago
- ☆77Updated 6 years ago
- 分析cobaltstrike c2 协议☆68Updated 5 years ago
- No inline asm,support x86/x64☆64Updated 3 years ago
- 模仿操作系统,加载pe文件到内存中☆74Updated 5 years ago
- bypass BeaconEye☆88Updated 3 years ago
- Go code examples of my blog.☆52Updated 2 years ago
- Windows10 & Windows Server 2016 LPE Exploit (use schedsvc!SchRpcSetSecurity())☆102Updated 6 years ago
- 窃取mstsc中的用户明文凭据☆45Updated 3 years ago