hyp3rlinx / PSTrojanFileLinks
Unfixed Windows PowerShell Filename Code Execution POC
β41Updated last year
Alternatives and similar repositories for PSTrojanFile
Users that are interested in PSTrojanFile are comparing it to the libraries listed below
Sorting:
- πΎDogwalk PoC (using diagcab file to obtain RCE on windows)β79Updated 3 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Labβ64Updated 10 months ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processesβ116Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)β40Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.β39Updated 2 years ago
- Duplicate not owned Token from Running Processβ72Updated 2 years ago
- β52Updated 2 years ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell proβ¦β85Updated 2 years ago
- A LAPS dumper written using the impacket library.β32Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windowsβ48Updated 2 years ago
- PoC-Malware-TTPsβ49Updated 2 years ago
- Tomcat backdoor based on CS blogβ27Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly levelβ26Updated 3 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.β67Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged pβ¦β49Updated 3 years ago
- Tool to start processes as SYSTEM using token duplicationβ38Updated 5 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy liftingβ38Updated 2 years ago
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.β83Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.β55Updated 4 years ago
- Proof of Concept for CVE-2023-23397 in Pythonβ25Updated 2 years ago
- β55Updated 11 months ago
- Tools for Attacking Pleasant Password Serverβ22Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.ioβ86Updated 4 months ago
- Tool for efficient directory enumerationβ65Updated last year
- β31Updated 3 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POCβ44Updated last year
- A small Aggressor script to help Red Teams identify foreign processes on a host machineβ84Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX sectionβ107Updated 2 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCEβ63Updated last year
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDriveβ109Updated 2 years ago