johnjohnsp1 / Shellcode-Via-HTA
How To Execute Shellcode via HTA
☆138Updated 7 years ago
Alternatives and similar repositories for Shellcode-Via-HTA:
Users that are interested in Shellcode-Via-HTA are comparing it to the libraries listed below
- Lateral Movement technique using DCOM and HTA☆233Updated 2 years ago
- Cobalt Strike SCT payload obfuscator☆142Updated 7 years ago
- ☆73Updated 7 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated 2 months ago
- ☆229Updated 6 years ago
- Port of eternal blue exploits to powershell☆150Updated 7 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆124Updated 6 years ago
- ☆94Updated 6 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- Collection of Aggressor Scripts for Cobalt Strike☆170Updated 6 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆119Updated 5 years ago
- VBS Reversed TCP Meterpreter Stager☆87Updated 7 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆210Updated 7 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆249Updated 4 years ago
- PowerDNS: Powershell DNS Delivery☆212Updated 6 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆257Updated 6 years ago
- Liniaal - A communication extension to Ruler☆97Updated 6 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆113Updated 8 years ago
- Generates anti-sandbox analysis HTA files without payloads☆119Updated 8 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆76Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆122Updated 4 years ago
- Python api for usage with cobalt strike's External C2 specification☆236Updated 2 years ago
- a simple portforwarder in ps1 with embeded c# code☆90Updated 6 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- Automated script for setting up CobaltStrike redirectors (nginx reverse proxy, letsencrypt)☆143Updated 7 years ago
- ☆211Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆271Updated 5 years ago
- The full story of the CLR implementation of Meterpreter☆150Updated 4 years ago
- initial commit☆174Updated 6 years ago
- ☆272Updated 2 years ago