inguardians / Invoke-ClipboardView external linksLinks
All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications
☆81Feb 21, 2019Updated 6 years ago
Alternatives and similar repositories for Invoke-Clipboard
Users that are interested in Invoke-Clipboard are comparing it to the libraries listed below
Sorting:
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- A simple splunk package for obtaining reverse shells on both Windows and most *nix systems.☆125Aug 20, 2018Updated 7 years ago
- Proof of concept for abusing SeLoadDriverPrivilege (Privilege Escalation in Windows)☆161Jun 14, 2018Updated 7 years ago
- Python script to decrypt passwords stored by mRemoteNG☆173Jul 6, 2023Updated 2 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- Joomla login bruteforce☆101Jul 18, 2024Updated last year
- This is a standalone exploit for a vulnerable feature in Capcom.sys☆324Sep 18, 2022Updated 3 years ago
- Loads a custom dll in system32 via diaghub.☆82Mar 16, 2020Updated 5 years ago
- Hide Mimikatz From Process Lists☆20Jul 10, 2015Updated 10 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆138Feb 24, 2020Updated 5 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆196Jun 30, 2019Updated 6 years ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- A PowerShell script to download all files, messages and user profiles that a user has access to in slack.☆155Oct 30, 2020Updated 5 years ago
- Use CVE-2020-0668 to perform an arbitrary privileged file move operation.☆229Feb 20, 2020Updated 5 years ago
- SQLC2 is a PowerShell script for deploying and managing a command and control system that uses SQL Server as both the control server and …☆77Nov 5, 2022Updated 3 years ago
- Example VBA Macro for MacOS Mojave☆66Oct 31, 2018Updated 7 years ago
- GitLab User Enumeration☆49Jan 3, 2025Updated last year
- Parse PowerShell and Security event logs for sensitive information.☆128Mar 29, 2019Updated 6 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- An example of a downloader written in NodeJS.☆24Apr 17, 2021Updated 4 years ago
- External C2 Using IE COM Objects☆101Feb 24, 2019Updated 6 years ago
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Oct 13, 2022Updated 3 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- Abusing Exchange via EWS☆152Sep 14, 2020Updated 5 years ago
- SharpBox is a C# tool for compressing, encrypting, and exfiltrating data to DropBox using the DropBox API.☆110Jan 20, 2021Updated 5 years ago
- Extracts Key Values from .keytab files☆346Aug 26, 2020Updated 5 years ago
- Using "svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc" as trigger☆58Oct 7, 2020Updated 5 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆68Apr 7, 2018Updated 7 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 8 years ago
- Asynchronous named pipe module for PowerShell☆21May 30, 2016Updated 9 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆427Aug 22, 2023Updated 2 years ago
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago