fox-it / dll-hijacking-pocView external linksLinks
A quick POC on how to embed a meterpreter in Firefox via DLL hijacking
☆17Jul 6, 2017Updated 8 years ago
Alternatives and similar repositories for dll-hijacking-poc
Users that are interested in dll-hijacking-poc are comparing it to the libraries listed below
Sorting:
- trivial transparent SMTP proxy☆13Dec 6, 2022Updated 3 years ago
- couchdb remote command exec.☆14Mar 27, 2018Updated 7 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- A windbg extension for ASLR/DEP/SafeSEH check☆28May 19, 2018Updated 7 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 6 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32May 1, 2020Updated 5 years ago
- Random Hashcat Scrips☆35Oct 12, 2024Updated last year
- Smart overlay for Cobalt Strike PS function☆30Mar 9, 2019Updated 6 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- A small two-file JSON serializer in C# that works on MonoDroid/MonoTouch☆11Jun 25, 2019Updated 6 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Aug 30, 2018Updated 7 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- ☆11Sep 1, 2019Updated 6 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- Datasette plugin providing a UI for executing SQL writes against the database☆12Nov 11, 2025Updated 3 months ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 7 months ago
- Standardizing Security Titles☆13Dec 31, 2025Updated last month
- Carbon Black integration Python utility library☆12Oct 29, 2020Updated 5 years ago
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- Tools for WD My Cloud Home☆11Jun 21, 2020Updated 5 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 6 months ago
- ☆12Apr 17, 2019Updated 6 years ago
- Tools for preservation of floppy disks☆11Nov 22, 2025Updated 2 months ago
- top usernames from azure survey 2025☆14Apr 25, 2025Updated 9 months ago
- Hey, Elon Chrome Extension☆12Nov 9, 2022Updated 3 years ago
- This is a PCL library that let you connect JavaScript on the browser side to the C# side by proxying C# code.☆15Jun 22, 2022Updated 3 years ago
- Golang syscall firehose (programmatic strace/dtruss)☆13Nov 26, 2020Updated 5 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- ☆11Jun 18, 2020Updated 5 years ago
- A collection of expired domains previously blocked by Russia's Roskomnadzor, now available for free registration. Reclaim the web! 🌐🔓☆11Feb 7, 2026Updated last week
- A Linux rootkit☆10Nov 1, 2018Updated 7 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- Sweetscape 010 Editor Nvidia VBios Templates☆14Aug 12, 2016Updated 9 years ago
- Source from https://twitter.com/pwnallthethings. Compiled in VS 2013☆18Jan 30, 2018Updated 8 years ago
- ☆10Jun 30, 2021Updated 4 years ago
- A GUI application for managing Solo v2 security keys☆11Updated this week