eimon96 / vbs2exeLinks
Convert VBS file to EXE
☆17Updated 8 months ago
Alternatives and similar repositories for vbs2exe
Users that are interested in vbs2exe are comparing it to the libraries listed below
Sorting:
- ☆20Updated 2 years ago
- Admin2Sys it's a C++ malware to escalate privileges from Administrator account to NT AUTORITY SYSTEM☆62Updated 2 years ago
- Injecting shellcode into a process memory and executing it in C#☆52Updated 3 years ago
- Obfuscator for batch script☆62Updated last year
- A program for obfuscating C strings☆36Updated 2 years ago
- ☆35Updated 2 years ago
- Simple c# source code obfuscator☆28Updated 7 years ago
- Unlock files and folders☆14Updated 3 years ago
- Group 4 - C# Remote Administrator Tool☆11Updated 11 months ago
- Change hash for a signed pe☆17Updated 2 years ago
- Detect VirtualBox, SandBox, Emulator, Debugger, Hosting, Processes in C#☆20Updated 5 years ago
- A small tool that allows to run WinAPI functions through command line parameters☆205Updated 3 years ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Updated 4 years ago
- Reverse Socks5 proxy for windows☆16Updated 3 years ago
- Titan: A crappy Reflective Loader written in C and assembly for Cobalt Strike. Redirects DNS Beacon over DoH☆69Updated 4 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 3 years ago
- User-mode implementation of HTTP.SYS. Implements HTTP 1.1 of the "HTTP Server API 2.0" for web servers☆44Updated 11 months ago
- Downloads, decode, decrypt and executes a VBScript using cmd and mshta☆19Updated 5 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆35Updated 4 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆44Updated last year
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆57Updated 2 years ago
- A persistant Windows Service Proof of Concept, where the Service will run after Restart or Shutdown, and invoke a given software executab…☆37Updated 2 years ago
- x64 Registration-Free In-Process COM Automation Server.☆51Updated 3 years ago
- UAC Bypass via CMUACUtil & PEB Enumeration, Undetected for now.☆51Updated last year
- This program is used to perform reflective DLL Injection to a remote process specified by the user.☆65Updated 2 years ago
- Convert native dll to shellcode, and support exported function☆25Updated 4 years ago
- My personal shellcode loader☆32Updated 2 years ago
- ProcessHollowing via csharp☆13Updated 4 years ago
- Dump certificates from PE files in different formats☆38Updated 2 years ago