jordanbtucker / dpapickLinks
DPAPI offline decryption utility
☆70Updated 2 years ago
Alternatives and similar repositories for dpapick
Users that are interested in dpapick are comparing it to the libraries listed below
Sorting:
- Windows DPAPI laboratory☆93Updated 7 years ago
- A simple python implementation of a BITS server.☆105Updated 3 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆96Updated 11 months ago
- ☆61Updated last year
- InsecurePowerShell is PowerShell with some security features removed.☆106Updated 7 years ago
- A proof-of-concept subject interface package (SIP) used to demonstrate digital signature subversion attacks.☆99Updated 7 years ago
- ☆38Updated 5 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Updated 8 years ago
- SCOMDecrypt is a tool to decrypt stored RunAs credentials from SCOM servers☆123Updated last year
- A repository of some of my Windows 10 Device Guard Bypasses☆138Updated 8 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆138Updated 5 years ago
- Proxy system calls over an RPC channel☆99Updated 3 years ago
- ☆60Updated 5 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- Documentation and supporting script sample for Windows Exploit Guard☆157Updated 3 years ago
- Code Exec via Excel☆87Updated 8 years ago
- Shim database persistence (Fin7 TTP)☆37Updated 5 years ago
- Security Descriptor Definition Language (SDDL) Parser☆38Updated 5 years ago
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆64Updated 5 years ago
- ☆68Updated 3 years ago
- A collection of tools to enumerate and analyse Windows DACLs☆109Updated 10 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Updated 5 years ago
- The hidden mstsc recorder player☆29Updated 5 years ago
- BlueHatIL 2020 - Staying # and Bringing Covert Injection Tradecraft to .NET☆147Updated 5 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Updated 5 years ago
- ☆29Updated 8 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 4 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆216Updated 5 years ago
- Managed code hooking template.☆133Updated 3 years ago