fox-it / dll-hijacking-pocLinks
A quick POC on how to embed a meterpreter in Firefox via DLL hijacking
☆17Updated 8 years ago
Alternatives and similar repositories for dll-hijacking-poc
Users that are interested in dll-hijacking-poc are comparing it to the libraries listed below
Sorting:
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Updated 6 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- ☆59Updated 6 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- ☆42Updated 9 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 9 years ago
- VBS Reversed TCP Meterpreter Stager☆89Updated 8 years ago
- Wrappers around smbclient and winexe with PTH support☆33Updated 9 years ago
- ☆50Updated 8 years ago
- ☆58Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆108Updated 8 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 11 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆118Updated 2 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- A framework for creating modular bots/backdoors☆21Updated 10 years ago
- BlackHat Europe 2017 Slides☆25Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- ☆53Updated 10 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆20Updated 9 years ago
- Projects and POCs☆60Updated 11 years ago
- Mimikatz HashClash☆12Updated 10 years ago