CSharp4Pentesters
☆11Mar 5, 2022Updated 4 years ago
Alternatives and similar repositories for CSharp4Pentesters
Users that are interested in CSharp4Pentesters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated 10 months ago
- ☆13Jan 27, 2024Updated 2 years ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 7 months ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- ☆10Oct 1, 2023Updated 2 years ago
- ☆18Sep 24, 2024Updated last year
- ☆21Nov 6, 2024Updated last year
- ☆15Sep 17, 2022Updated 3 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 11 months ago
- sl0ppy-PrivescTaskCreator.ps1☆40Oct 8, 2025Updated 5 months ago
- Cobalt Strike BOF Files with Nim!☆86Jul 10, 2022Updated 3 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- A tool to verify and create PE Checksums for Portable Executable (PE) files.☆57Jun 14, 2023Updated 2 years ago
- An interactive mock C2 server☆17Feb 25, 2023Updated 3 years ago
- A cheatsheet and mindmap for CRTO certification☆15Mar 22, 2023Updated 3 years ago
- ☆13Jan 17, 2025Updated last year
- Reverse Shell x86☆16Jan 6, 2019Updated 7 years ago
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆15Apr 29, 2022Updated 3 years ago
- Some of the lab files for the SANS Institute course SEC505: Securing Windows and PowerShell Automation: https://sans.org/sec505☆18Jun 8, 2017Updated 8 years ago
- Windows Reverse TCP Shellcode ( 420 Bytes )☆21Feb 14, 2022Updated 4 years ago
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆102Jun 16, 2024Updated last year
- ☆38Aug 6, 2025Updated 7 months ago
- all shell backdoor in the world☆18Jun 14, 2025Updated 9 months ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 8 months ago
- list of resource about low level dev☆18Nov 15, 2025Updated 4 months ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Sep 8, 2021Updated 4 years ago
- Simple HTTP proxy in one Python file, with throttling and header/content dumping☆23Oct 1, 2009Updated 16 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- Simple root privilege escalation detection using eBPF 🐝☆35Feb 10, 2026Updated last month
- AV bypass while you sip your Chai!☆223May 17, 2024Updated last year
- Udemy – Linux Heap Exploitation☆55Jun 14, 2021Updated 4 years ago
- MDE/MDI Defender setup for Ludus☆54Mar 14, 2026Updated last week
- Simple PoC to locate hooked functions by EDR in ntdll.dll☆46Jul 16, 2023Updated 2 years ago
- shamelessly ripped from https://github.com/khalilbijjou/WAFNinja/☆19Dec 16, 2016Updated 9 years ago
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆26Jul 26, 2024Updated last year
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago