CSharp4Pentesters
☆11Mar 5, 2022Updated 4 years ago
Alternatives and similar repositories for CSharp4Pentesters
Users that are interested in CSharp4Pentesters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated last year
- ☆13Jan 27, 2024Updated 2 years ago
- Adversary Simulation Framework☆40Aug 19, 2025Updated 8 months ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆19Feb 8, 2025Updated last year
- ☆18Sep 24, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆21Nov 6, 2024Updated last year
- ☆15Sep 17, 2022Updated 3 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated last year
- sl0ppy-PrivescTaskCreator.ps1☆41Oct 8, 2025Updated 6 months ago
- Cobalt Strike BOF Files with Nim!☆86Jul 10, 2022Updated 3 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 11 months ago
- Better version of SharpPick☆14Aug 29, 2025Updated 8 months ago
- Static analysis & exploitation-triage toolkit for Windows kernel drivers. Discover IOCTLs, Symbolic Links, and check cert , and Downlaods…☆133Apr 27, 2026Updated last week
- Active Directory Certificate Services (ADCS) enumeration library with BloodHound CE v6 export support☆77Apr 26, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A tool to verify and create PE Checksums for Portable Executable (PE) files.☆57Jun 14, 2023Updated 2 years ago
- An interactive mock C2 server☆17Feb 25, 2023Updated 3 years ago
- A cheatsheet and mindmap for CRTO certification☆16Mar 22, 2023Updated 3 years ago
- ☆13Jan 17, 2025Updated last year
- Reverse Shell x86☆16Jan 6, 2019Updated 7 years ago
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆15Apr 29, 2022Updated 4 years ago
- Some of the lab files for the SANS Institute course SEC505: Securing Windows and PowerShell Automation: https://sans.org/sec505☆18Jun 8, 2017Updated 8 years ago
- Windows Reverse TCP Shellcode ( 420 Bytes )☆21Feb 14, 2022Updated 4 years ago
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆38Aug 6, 2025Updated 8 months ago
- all shell backdoor in the world☆19Jun 14, 2025Updated 10 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆128Jun 16, 2024Updated last year
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆57Jun 30, 2025Updated 10 months ago
- list of resource about low level dev☆18Nov 15, 2025Updated 5 months ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Sep 8, 2021Updated 4 years ago
- Simple HTTP proxy in one Python file, with throttling and header/content dumping☆24Oct 1, 2009Updated 16 years ago
- Advanced post-exploitation framework designed for Red Team operations in Entra ID, Azure and Microsoft 365 environments.☆50Apr 1, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- Simple root privilege escalation detection using eBPF 🐝☆35Feb 10, 2026Updated 2 months ago
- AV bypass while you sip your Chai!☆222May 17, 2024Updated last year
- Udemy – Linux Heap Exploitation☆56Jun 14, 2021Updated 4 years ago
- shamelessly ripped from https://github.com/khalilbijjou/WAFNinja/☆19Dec 16, 2016Updated 9 years ago
- MDE/MDI Defender setup for Ludus☆56Mar 14, 2026Updated last month
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Jul 16, 2023Updated 2 years ago