Microsoft Windows HTA (HTML Application) - Remote Code Execution
☆30Aug 21, 2015Updated 10 years ago
Alternatives and similar repositories for HTA-Exploit-
Users that are interested in HTA-Exploit- are comparing it to the libraries listed below
Sorting:
- Shortcut Downloader☆11Jan 11, 2017Updated 9 years ago
- ☆43Aug 1, 2019Updated 6 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 8 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- ☆78May 24, 2018Updated 7 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- clone from http://ujeni.murkyroc.com/hmap/☆18Mar 25, 2020Updated 5 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- ☆18Mar 20, 2017Updated 9 years ago
- SSH Based Remote Administration Tool☆103Jul 9, 2015Updated 10 years ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- ☆19May 31, 2017Updated 8 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Jan 2, 2018Updated 8 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- ☆44Apr 20, 2020Updated 5 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- testing123☆13Nov 23, 2024Updated last year
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Small script to assemble/disassemble from CLI☆23Aug 15, 2022Updated 3 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Jun 24, 2013Updated 12 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 9 years ago
- Attack Knowledge Base☆101Jul 5, 2017Updated 8 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- Generates several metasploit payloads☆15Apr 13, 2018Updated 7 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆19Apr 20, 2016Updated 9 years ago
- Python tools for interacting with a DarkComet Client☆54Aug 4, 2015Updated 10 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Oct 6, 2016Updated 9 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago