☆18Nov 24, 2020Updated 5 years ago
Alternatives and similar repositories for Set-RBCDBytes
Users that are interested in Set-RBCDBytes are comparing it to the libraries listed below
Sorting:
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- DInvisibleRegistry☆83Nov 20, 2020Updated 5 years ago
- Python implementation of select MicroBurst scripts.☆14Aug 19, 2021Updated 4 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆61Mar 19, 2021Updated 5 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆18Mar 24, 2025Updated 11 months ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- IOXIDResolver from AirBus Security/PingCastle☆51Nov 25, 2020Updated 5 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 6 years ago
- Linux AV tests☆13Apr 23, 2019Updated 6 years ago
- Implementation of SpoolSample without rDLL☆29Sep 28, 2020Updated 5 years ago
- ☆12Feb 19, 2026Updated last month
- ☆13Mar 22, 2021Updated 4 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- A proof of concept on attack vectors against Active Directory by abusing Active Directory Certificate Services (ADCS)☆192Jul 7, 2021Updated 4 years ago
- PoC of Spring AMQP Deserialization Vulnerability (CVE-2023-34050)☆13Jan 29, 2024Updated 2 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 9 months ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- ☆16Nov 28, 2025Updated 3 months ago
- ☆25Jul 7, 2022Updated 3 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- Remotely enables Restricted Admin Mode☆215Sep 3, 2021Updated 4 years ago
- Unchain AMSI by patching the provider’s unmonitored memory space☆91Nov 24, 2022Updated 3 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123May 22, 2021Updated 4 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- Smart Card PIN swiping DLL☆78Oct 4, 2020Updated 5 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆26Jun 13, 2019Updated 6 years ago
- A simple BOF implementation of klist using Windows API☆32Jul 7, 2022Updated 3 years ago
- My doodles as I learn C#☆76Sep 6, 2020Updated 5 years ago
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- HookDetection☆45Sep 3, 2021Updated 4 years ago
- AWS Cloud Landscape Search Engine☆20Nov 29, 2023Updated 2 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆166Sep 10, 2021Updated 4 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Apr 9, 2019Updated 6 years ago
- ☆181Feb 3, 2021Updated 5 years ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Sep 24, 2022Updated 3 years ago