fashionproof / RunHijackHunterView external linksLinks
☆18May 3, 2021Updated 4 years ago
Alternatives and similar repositories for RunHijackHunter
Users that are interested in RunHijackHunter are comparing it to the libraries listed below
Sorting:
- ☆13Jan 20, 2020Updated 6 years ago
- C# User Simulation☆33Oct 6, 2022Updated 3 years ago
- Proof of Concept for EFSRPC Arbitrary File Upload (CVE-2021-43893)☆64Feb 14, 2022Updated 3 years ago
- PowerShell Module for parsing logs generated by Sysinternals Sysmon for Linux☆37Mar 20, 2022Updated 3 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆46Mar 1, 2021Updated 4 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- ☆21Jan 28, 2020Updated 6 years ago
- A standalone WMI protocol for CrackMapExec☆51Feb 3, 2020Updated 6 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆281Oct 29, 2024Updated last year
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- Watches for trigger packets, runs commands or spawns a shell☆26May 29, 2019Updated 6 years ago
- MSTSC Packet Dump Utility☆30Feb 11, 2022Updated 4 years ago
- Coerce Windows machines auth via MS-EVEN☆171Jan 17, 2024Updated 2 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆111Apr 20, 2021Updated 4 years ago
- A PoC project for embedding shellcode to Hint/Name Table☆113May 16, 2022Updated 3 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- ☆26Dec 29, 2021Updated 4 years ago
- A list of windows potatoes!☆26Mar 6, 2022Updated 3 years ago
- ☆25Sep 28, 2020Updated 5 years ago
- CVE-2019-1040 with Kerberos delegation☆33Jun 18, 2021Updated 4 years ago
- Simple Process Hollowing in C#☆68Oct 23, 2017Updated 8 years ago
- Preventing 3rd Party DLLs from Injecting into your Malware☆25Aug 31, 2021Updated 4 years ago
- A Beacon Object File (BOF) implementation of the 'cat' command☆25Feb 11, 2023Updated 3 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- Windows RID Hijacking persistence technique☆178Nov 20, 2024Updated last year
- The official challenges and deployment source code files used in San Diego CTF 2022.☆28May 14, 2022Updated 3 years ago
- Userland API Unhooker Project☆110Jun 14, 2021Updated 4 years ago
- Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack☆27Mar 6, 2021Updated 4 years ago
- Managed code hooking template.☆108Feb 15, 2021Updated 4 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆74Feb 28, 2020Updated 5 years ago
- ☆180Feb 3, 2021Updated 5 years ago
- AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.☆67Jun 14, 2020Updated 5 years ago
- Collection of macOS persistence methods and miscellaneous tools in JXA☆286Aug 3, 2023Updated 2 years ago
- ☆32Jun 10, 2020Updated 5 years ago