Microsoft Windows HTA (HTML Application) - Remote Code Execution
☆30Aug 21, 2015Updated 10 years ago
Alternatives and similar repositories for HTA-Exploit-
Users that are interested in HTA-Exploit- are comparing it to the libraries listed below
Sorting:
- Shortcut Downloader☆11Jan 11, 2017Updated 9 years ago
- clone from http://ujeni.murkyroc.com/hmap/☆18Mar 25, 2020Updated 5 years ago
- ☆43Aug 1, 2019Updated 6 years ago
- ☆78May 24, 2018Updated 7 years ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- SSH Based Remote Administration Tool☆103Jul 9, 2015Updated 10 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- Chrome Debugging Protocol interface for python asyncio☆14Oct 31, 2020Updated 5 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- Attack Knowledge Base☆101Jul 5, 2017Updated 8 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Oct 6, 2016Updated 9 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆25Jul 9, 2025Updated 7 months ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- ☆44Apr 20, 2020Updated 5 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- A better alternative to RunDLL32☆35Jun 11, 2019Updated 6 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 8 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Jar Protector - Jar Crypter☆15May 18, 2018Updated 7 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 8 months ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- couchdb remote command exec.☆14Mar 27, 2018Updated 7 years ago
- C# User Simulation☆33Oct 6, 2022Updated 3 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 5 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- Semantic SSH RSA keys☆25Feb 25, 2014Updated 12 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 7 years ago
- This program implements port knocking for access to Windows via RDP / TS☆15Apr 5, 2021Updated 4 years ago
- A simple framework for distributed task workflow using redis.☆32Jan 13, 2014Updated 12 years ago