lockfale / DotNetAVBypass-Master
C# AV bypass jank
☆31Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for DotNetAVBypass-Master
- Cobaltstrike Aggressor Scripts☆28Updated 7 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆15Updated 5 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Updated 7 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆17Updated 5 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- Hide Mimikatz From Process Lists☆17Updated 9 years ago
- C# Implementation of Get-VaultCredential☆13Updated 6 years ago
- C# DCOM Execution☆18Updated 5 years ago
- ☆44Updated 4 years ago
- ☆54Updated 6 years ago
- WIP event and job queue using redis for Cobalt Strike☆33Updated 5 years ago
- interesting analysis☆16Updated 6 years ago
- ☆51Updated 5 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆24Updated 6 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- Use powershell to test Office-based persistence methods☆76Updated 3 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- A repo to hold any bypasses I work on/study/whatever☆18Updated 3 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 7 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Updated 5 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆23Updated 5 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆42Updated 7 years ago
- Cobalt Strike cna script for randomized argument spoofing☆52Updated 5 years ago