Unfixed Windows PowerShell Filename Code Execution POC
☆41Dec 26, 2023Updated 2 years ago
Alternatives and similar repositories for PSTrojanFile
Users that are interested in PSTrojanFile are comparing it to the libraries listed below
Sorting:
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆14Jul 28, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆70Apr 18, 2023Updated 2 years ago
- Weaponized HellsGate/SigFlip☆204Jun 7, 2023Updated 2 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 5 months ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆38Dec 7, 2025Updated 3 months ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Apr 25, 2018Updated 7 years ago
- Woodpecker framework Tomcat vulnerability library☆15May 23, 2021Updated 4 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Dec 5, 2022Updated 3 years ago
- ⚙️ Map and execute EXE in memory☆12Dec 23, 2022Updated 3 years ago
- You can check below blog post on attacks related to azure storage.☆13Apr 8, 2021Updated 4 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 9 months ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Oct 8, 2020Updated 5 years ago
- Execute DLL via the Excel.Application object's RegisterXLL() method☆22Apr 17, 2021Updated 4 years ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- 内网横向利用工具,用于ssh wmiexec等常规服务,也可以当作一个数据库执行命令工具☆68May 15, 2023Updated 2 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Tools to decrypt Google Chrome, Mozilla Firefox and Microsoft Edge login/password information.☆17Apr 10, 2023Updated 2 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Stealthy Windows backdoor☆13Dec 2, 2020Updated 5 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- ☆163Oct 25, 2023Updated 2 years ago
- CVE-2021-38003 exploits extracted from https://twitter.com/WhichbufferArda/status/1609604183535284224☆38Jan 7, 2023Updated 3 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- Convert .bat files to .vbs☆14Aug 15, 2023Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- A multi-client reverse shell that allows multiple connections from target computers☆19Oct 25, 2025Updated 4 months ago
- CVE-2023-4911 proof of concept☆169Oct 8, 2023Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Dec 30, 2023Updated 2 years ago
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago
- This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS)☆18Mar 13, 2024Updated 2 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆18Mar 27, 2024Updated last year
- ☆109Feb 21, 2023Updated 3 years ago