☆29Oct 17, 2018Updated 7 years ago
Alternatives and similar repositories for xbapAppWhitelistBypassPOC
Users that are interested in xbapAppWhitelistBypassPOC are comparing it to the libraries listed below
Sorting:
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 8 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- .NET Resource Reflector☆19Mar 25, 2025Updated 11 months ago
- Arya is a simple obfuscator for .NET binaries.☆37Dec 11, 2017Updated 8 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Oct 30, 2019Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Automate creating resilient, disposable, secure and agile monitoring infrastructure for Blue Teams.☆24Oct 31, 2022Updated 3 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Jul 6, 2021Updated 4 years ago
- (Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that…☆43Mar 2, 2020Updated 6 years ago
- A minimal tool to extract shellcode from 64-bit PE binaries.☆54Sep 13, 2021Updated 4 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- ☆93Nov 1, 2018Updated 7 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- Provides a way which you can load a .NET dll/exe from disk, modify/inject IL, and then run the assembly all in memory without modifying t…☆29Mar 31, 2017Updated 8 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- Evolutionary Neural Network Encoder of Shenanigans. Obfuscating shellcode with an encoder that uses genetic algorithms to evolve neural n…☆24Nov 26, 2019Updated 6 years ago
- Yet another open S3 bucket finder☆20Mar 8, 2018Updated 7 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Aug 9, 2019Updated 6 years ago
- Exploit the vulnerability to execute the calculator☆68Jan 11, 2018Updated 8 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- An implementation of PSExec in C#☆337Dec 1, 2020Updated 5 years ago
- KIMS Multi AV Scanner by DSR!☆31Mar 17, 2020Updated 5 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- PoC that manipulates Windows file times using SetFileTime() API☆63May 25, 2019Updated 6 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- This repository contains the POC of an exploit for node-jose < 0.11.0☆25Feb 24, 2023Updated 3 years ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆68Mar 6, 2020Updated 6 years ago