jpginc / xbapAppWhitelistBypassPOCLinks
☆28Updated 6 years ago
Alternatives and similar repositories for xbapAppWhitelistBypassPOC
Users that are interested in xbapAppWhitelistBypassPOC are comparing it to the libraries listed below
Sorting:
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- module for certexfil☆15Updated 3 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- CVE-2020-5837 exploit☆41Updated 5 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Password reader for Mozilla Firefox and Thunderbird☆23Updated 5 years ago
- Windows Shellcode Testing Utility to Run Shellcode From A File☆12Updated 5 years ago
- A better alternative to RunDLL32☆30Updated 6 years ago
- ☆17Updated 5 years ago
- Monitor Files and Folders for Changes in Real Time .☆10Updated 6 years ago
- Use to generate DLL through Visual Studio☆20Updated 7 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆32Updated 7 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- C# Situational Awareness Script☆34Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- Windows productivity tweaks☆15Updated 5 years ago
- Several self-defense shellcodes☆22Updated 6 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Updated 6 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Updated 5 years ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Updated 4 years ago
- Jar Protector - Jar Crypter☆14Updated 7 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- Windows 10 Exploit☆30Updated 6 years ago