giMini / PowerRSALinks
Generate RSA keys, encrypt and decrypt data
☆24Updated 4 years ago
Alternatives and similar repositories for PowerRSA
Users that are interested in PowerRSA are comparing it to the libraries listed below
Sorting:
- Post-explotation Hacks☆14Updated 7 years ago
- ☆21Updated 9 years ago
- Common Malware Techniques☆13Updated 2 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Updated 10 years ago
- Making shellcode UD - https://osandamalith.com☆25Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 10 years ago
- ☆22Updated 8 years ago
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆27Updated 9 years ago
- ☆65Updated 9 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated last month
- Anti-AV compilation☆44Updated 12 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 10 years ago
- Hyper-V virtual switch packet capturing extension with libpcap / Wireshark format☆13Updated 11 years ago
- A PowerShell binding for the Unicorn Engine☆17Updated 10 years ago
- ☆30Updated 8 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Updated 9 years ago
- ☆16Updated 8 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Updated 7 years ago
- Low-level MS Windows registry files analysis tools☆19Updated 9 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 13 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Updated 7 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- metasploit loader with antivirus bypass module☆18Updated 9 years ago
- PowerShell script to bypass UAC using DCCW☆19Updated 8 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Updated 9 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆68Updated 7 years ago
- OpenHIPS prevents exploitation of Windows systems☆35Updated 13 years ago
- ☆10Updated 7 years ago