PoC of a protected process causing a blue screen if killed.
☆15Jul 31, 2018Updated 7 years ago
Alternatives and similar repositories for BlueScreenOnExit
Users that are interested in BlueScreenOnExit are comparing it to the libraries listed below
Sorting:
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- An example pattern in C# for watching security events (logon/logoff/privilege)☆17Aug 13, 2018Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- ☆22Mar 5, 2018Updated 7 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- Project files associated with my 'C# Bruteforce Website Logins' series on YouTube.☆10Jul 17, 2018Updated 7 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 8 years ago
- Download payload to disk and install it to startup then melt.☆35Apr 9, 2019Updated 6 years ago
- cve-2018-2894 不同别人的利用方法。☆15Dec 1, 2025Updated 3 months ago
- ☆16Dec 31, 2016Updated 9 years ago
- Old (read: bad) external csgo cheat, includes knife changer and convar bypass☆23Nov 3, 2017Updated 8 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago
- Deobfuscate Babel 8.5's VM☆12Aug 11, 2016Updated 9 years ago
- Anti-Debug methods with C#☆14Dec 20, 2020Updated 5 years ago
- SkyRAT - Powershell Remote Administration Tool☆33Jan 8, 2018Updated 8 years ago
- Toy version of the sweet32 attack☆16Nov 24, 2017Updated 8 years ago
- Download a .NET payload and run it on memory☆70Apr 12, 2019Updated 6 years ago
- ☆13Apr 1, 2017Updated 8 years ago
- .NET applications hacking toolset☆18Jan 12, 2021Updated 5 years ago
- Simple Cryptor on C ++ without using .NET and other nonsense.☆12Sep 4, 2025Updated 5 months ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- A pattern for a self-installing Windows service in C# with the unstoppable attributes in C#.☆67Jan 19, 2019Updated 7 years ago
- Downloads, decode, decrypt and executes a VBScript using cmd and mshta☆19Jun 26, 2020Updated 5 years ago
- ☆45Nov 5, 2018Updated 7 years ago
- A simple DLL injection lib using Easyhook, inspired by VInj.☆19Jun 29, 2022Updated 3 years ago