jordanbtucker / dpapick
DPAPI offline decryption utility
☆68Updated 2 years ago
Alternatives and similar repositories for dpapick:
Users that are interested in dpapick are comparing it to the libraries listed below
- Windows DPAPI laboratory☆88Updated 6 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 8 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆134Updated 7 years ago
- ☆35Updated 4 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆55Updated 5 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆93Updated 5 months ago
- ☆60Updated 4 years ago
- InsecurePowerShell is PowerShell with some security features removed.☆103Updated 7 years ago
- A simple python implementation of a BITS server.☆104Updated 2 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆87Updated 10 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆135Updated 4 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆71Updated 4 years ago
- Python DPAPI NG Decryptor for non-Windows Platforms☆57Updated 2 months ago
- ☆61Updated last year
- PE File Blessing - To continue or not to continue☆86Updated 5 years ago
- A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆95Updated 7 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆214Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆106Updated 5 years ago
- ☆28Updated 7 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆64Updated 5 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆145Updated 5 years ago
- Code Exec via Excel☆86Updated 7 years ago
- Leghorn code for PKI abuse☆32Updated 3 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆88Updated 5 years ago
- Pypykatz agent implemented in .NET☆86Updated 5 years ago
- Proxy system calls over an RPC channel☆97Updated 3 years ago
- named pipe server with impersonation☆57Updated 5 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 3 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Updated 5 years ago