decalage2 / oledump-contrib
The oledump-contrib repository contains plugins and enhancements for the oledump tool published by Didier Stevens.
☆52Updated 8 years ago
Alternatives and similar repositories for oledump-contrib:
Users that are interested in oledump-contrib are comparing it to the libraries listed below
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 3 years ago
- Powershell to copy ntds.dit☆61Updated 8 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- use COM Object hijacking to maintain persistence.(Hijack CAccPropServicesClass and MMDeviceEnumerator)☆58Updated 7 years ago
- Proof of Concept exploit for CVE-2017-8570☆186Updated 7 years ago
- POSHSPY backdoor code☆43Updated 8 years ago
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆108Updated 6 years ago
- Learn from Casey Smith@subTee☆29Updated 4 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Updated 6 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆44Updated last year
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆67Updated 6 years ago
- A tool to run .Net DLLs from the command line☆102Updated 6 years ago
- Security Support Provider Interface☆46Updated 5 years ago
- Small tool to load shellcodes or PEs to analyze them☆81Updated 6 years ago
- Use Waitfor.exe to maintain persistence☆54Updated 4 years ago
- Malleable C2 profiles for Cobalt Strike☆72Updated 2 years ago
- a patched sshd for red team activities☆81Updated 3 years ago
- inject or convert shellcode to PE☆38Updated 5 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 6 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆164Updated 5 years ago
- Basic c-keylogger☆25Updated 7 years ago
- just test☆65Updated 2 years ago
- initial commit☆44Updated 5 months ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Updated 5 years ago
- Penetration test☆55Updated 4 years ago
- Use subProcessTag Value From TEB to identify Event Log Threads☆85Updated 4 years ago
- Stealing passwords every time they change☆66Updated 5 years ago
- Scripts for performing and detecting parent PID spoofing☆145Updated 4 years ago