jordanbtucker / dpapickView external linksLinks
DPAPI offline decryption utility
☆73Dec 20, 2022Updated 3 years ago
Alternatives and similar repositories for dpapick
Users that are interested in dpapick are comparing it to the libraries listed below
Sorting:
- Windows DPAPI laboratory☆95Mar 5, 2018Updated 7 years ago
- ☆21Aug 31, 2025Updated 5 months ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- A command line tool that sends its input data to a running procmon instance.☆15Feb 24, 2017Updated 8 years ago
- DPAPILAB Next Gen, script collection☆94Aug 26, 2022Updated 3 years ago
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 5 years ago
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- ☆54Apr 27, 2019Updated 6 years ago
- Windows (ShadowMove) Socket Duplication☆87Apr 19, 2020Updated 5 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- ☆39Apr 8, 2020Updated 5 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- PowerShell module for X509 certificates, using BouncyCastle☆14Mar 4, 2017Updated 8 years ago
- ☆220Apr 2, 2018Updated 7 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- Verify and decrypt .NET's .ASPXAUTH cookie from node.☆11Jul 18, 2023Updated 2 years ago
- Change the line or block comment and bracket styles for various languages.☆11Jun 7, 2024Updated last year
- Event metadata collected across all manifest-based ETW providers on Window 10 1903☆31Nov 25, 2019Updated 6 years ago
- ☆101Aug 23, 2021Updated 4 years ago
- a tool to make it easy and fast to test various forms of injection☆172May 2, 2019Updated 6 years ago
- ☆11Aug 3, 2018Updated 7 years ago
- Terminal emulator for serial port connections☆13Updated this week
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 6 years ago
- Ext2/3/4 file system utilities☆15Jul 4, 2015Updated 10 years ago
- Enhanced Windows Control Panel.☆15Mar 1, 2020Updated 5 years ago
- PoC to interact with local/remote registry hives through WMI☆87Jun 14, 2020Updated 5 years ago
- AppContainer and LPAC (Less Privileged AppContainer) Launcher with Capabilities☆60Sep 19, 2024Updated last year
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 3 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆455Dec 23, 2020Updated 5 years ago
- PoC for proxying COM objects when hijacking☆214Sep 10, 2019Updated 6 years ago
- Example code for using named pipe output with beacon ReflectiveDLLs☆121Jun 24, 2020Updated 5 years ago
- An extensible, multi-format audio conversion and tagging module for Windows PowerShell☆17Nov 7, 2018Updated 7 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- ☆19Mar 9, 2021Updated 4 years ago
- Tools for macOS Forensic Bootable media☆15May 20, 2020Updated 5 years ago
- A tool to exploit .NET Remoting Services☆535Jul 31, 2024Updated last year
- A very proof-of-concept port of InlineWhispers for using syscalls in Nim projects.☆166Sep 10, 2021Updated 4 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Jul 7, 2020Updated 5 years ago