jordanbtucker / dpapickLinks
DPAPI offline decryption utility
☆72Updated 2 years ago
Alternatives and similar repositories for dpapick
Users that are interested in dpapick are comparing it to the libraries listed below
Sorting:
- A simple python implementation of a BITS server.☆105Updated 3 years ago
- Windows DPAPI laboratory☆94Updated 7 years ago
- ☆61Updated last year
- A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆100Updated 7 years ago
- Code Exec via Excel☆88Updated 8 years ago
- InsecurePowerShell is PowerShell with some security features removed.☆104Updated 7 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆138Updated 5 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆124Updated 2 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆97Updated last year
- PE File Blessing - To continue or not to continue☆87Updated 6 years ago
- Leghorn code for PKI abuse☆32Updated 4 years ago
- ☆60Updated 5 years ago
- Security Descriptor Definition Language (SDDL) Parser☆38Updated last month
- Managed code hooking template.☆133Updated 4 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆69Updated 4 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 3 years ago
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆64Updated 6 years ago
- ☆29Updated 8 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 9 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆61Updated last year
- Managed code hooking template.☆108Updated 4 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated last year
- A repository of some of my Windows 10 Device Guard Bypasses☆139Updated 8 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 4 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆218Updated 5 years ago
- Proxy system calls over an RPC channel☆99Updated 3 years ago
- ☆108Updated 4 years ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆31Updated 5 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Updated 5 years ago