Tool aided persistence via Windows URI schemes abuse
☆84Mar 1, 2020Updated 6 years ago
Alternatives and similar repositories for backoori
Users that are interested in backoori are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Apr 9, 2019Updated 6 years ago
- medium-rare☆28Nov 21, 2019Updated 6 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆143Jul 11, 2020Updated 5 years ago
- Shellcoding utilities☆225Dec 16, 2020Updated 5 years ago
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆351Nov 14, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆37Jun 27, 2020Updated 5 years ago
- SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and s…☆63Sep 2, 2020Updated 5 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- .NET 4.0 Scheduled Job Lateral Movement☆90Aug 25, 2020Updated 5 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Dec 27, 2019Updated 6 years ago
- Hawkeye filesystem analysis tool☆242Jul 21, 2018Updated 7 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Windows 10 UAC bypass for all executable files which are autoelevate true .☆641Dec 9, 2019Updated 6 years ago
- A tool to create obfuscated HTA script.☆178Jul 2, 2021Updated 4 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆203Jul 14, 2021Updated 4 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- ☆181Feb 3, 2021Updated 5 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Jul 14, 2021Updated 4 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆197Mar 19, 2020Updated 6 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,610Jul 10, 2023Updated 2 years ago
- A HTA shell to assist with breakout assessments.☆113Oct 20, 2021Updated 4 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- Enumerate and decrypt TeamViewer credentials from Windows registry☆239Dec 5, 2021Updated 4 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33May 28, 2019Updated 6 years ago
- Tool to create hidden registry keys.☆490Oct 23, 2019Updated 6 years ago
- Tools for discovery and abuse of COM hijacks☆334Oct 15, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Dec 8, 2022Updated 3 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 6 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆355Dec 1, 2020Updated 5 years ago
- Automatic UAC-Bypassing for custom payloads during privilege escalation testing☆98Aug 13, 2022Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago