johnjohnsp1 / WindowsScriptHostExtension
Extend WSH functionality with Registration-Free COM
☆26Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for WindowsScriptHostExtension
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆25Updated 6 years ago
- ☆33Updated 7 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆31Updated 4 years ago
- Removal of certain event logs within a Windows OS☆7Updated 5 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆30Updated 6 years ago
- Win32k Elevation of Privilege Poc☆0Updated 5 years ago
- ☆24Updated 6 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago
- Inject DLL Prototype using Microsoft.Windows.ACTCTX COM Object☆19Updated 7 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆21Updated 5 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆9Updated 8 years ago
- ☆45Updated 6 years ago
- PowerShell script to bypass UAC using DCCW☆18Updated 7 years ago
- Run Managed Assemblies with RunDll☆16Updated 6 years ago
- A simple reflective dll example☆18Updated 7 years ago
- ☆12Updated 8 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆13Updated 6 years ago
- ☆16Updated 7 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- ☆24Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- ☆15Updated 4 years ago
- module for certexfil☆15Updated 2 years ago