hausec / MaliciousClickOnceMSBuildLinks
Basic C# Project that will take an MSBuild payload and run it with MSBuild via ClickOnce.
☆92Updated 5 years ago
Alternatives and similar repositories for MaliciousClickOnceMSBuild
Users that are interested in MaliciousClickOnceMSBuild are comparing it to the libraries listed below
Sorting:
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 4 years ago
- ☆98Updated 3 years ago
- AMSI Bypass Via the Heap☆107Updated 5 years ago
- MSBuild without MSbuild.exe☆135Updated 5 years ago
- Service Enumeration C# .NET Assembly☆59Updated 4 years ago
- Outlook persistence using VSTO add-ins☆87Updated 5 years ago
- Port of Invoke-Excel4DCOM☆104Updated 6 years ago
- Load C# Code straight to memory☆56Updated 5 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- (kinda) Malicious Outlook Reader☆137Updated 4 years ago
- ☆53Updated 5 years ago
- ☆71Updated 5 years ago
- ☆46Updated 4 years ago
- A small .NET compression utility☆57Updated 3 years ago
- ☆73Updated 4 years ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆67Updated 5 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 5 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago
- Credential Dumper☆79Updated 5 years ago
- Suite of Shellcode Running Utilities☆114Updated 5 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆62Updated 6 years ago
- A more obfuscated CactusTorch targeted towards office☆31Updated 4 years ago
- A port of FuzzySecurity's UrbanBishop project for inline shellcode execution☆119Updated 5 years ago
- Iterative AD discovery toolkit for offensive operations☆85Updated 5 years ago
- ☆70Updated 4 years ago
- SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and s…☆63Updated 5 years ago
- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly☆90Updated last year
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Updated 5 years ago