hatnetsec / NetworkMinerLinks
The mirror of NetworkMiner
☆26Updated 8 years ago
Alternatives and similar repositories for NetworkMiner
Users that are interested in NetworkMiner are comparing it to the libraries listed below
Sorting:
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- This PS script will extract macro from Excel and Word files. Also checks the macro for suspecious code patterns Includes temporary DDE ch…☆34Updated last year
- Remote command shell application written in C# targeting the .NET runtime.☆29Updated 2 weeks ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆23Updated 5 years ago
- Monitor the textual data pasted into Windows clipboard☆29Updated 7 years ago
- Cross platform filtering HTTP/S proxy based on .NET Standard 2.0.☆44Updated 4 years ago
- Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a…☆32Updated 5 years ago
- Execute .Net assemblies using Rundll32.exe☆114Updated 4 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆70Updated 4 years ago
- This is a monorepo including codes from grey hat c# by no starch and some of my own research with it.☆60Updated 4 years ago
- The program is designed to dump full memory of the process by specifing process name or process id.☆41Updated 6 years ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- Persistent through COM Hijacking☆22Updated 7 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Updated 5 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆53Updated 7 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated 2 years ago
- Penetration Test / Read Team - C# tools repository☆55Updated 4 years ago
- Inject code into .net applications☆12Updated 7 years ago
- This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffi…☆31Updated 4 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆81Updated last year
- DDoor - cross platform backdoor using dns txt records☆30Updated 4 years ago
- Windows Process Lockdown Tool using Job Objects☆70Updated 12 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆138Updated 5 years ago
- CVE-2020-5837 exploit☆43Updated 5 years ago
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆78Updated 6 years ago
- Self-healing RAT utilizing libp2p☆88Updated 5 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Updated 3 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆111Updated 5 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 5 years ago