malcomvetter / SneakyService
A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows services.
☆16Updated 9 years ago
Alternatives and similar repositories for SneakyService:
Users that are interested in SneakyService are comparing it to the libraries listed below
- ☆25Updated 6 years ago
- ☆26Updated 6 years ago
- ☆18Updated 7 years ago
- ☆21Updated 7 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆58Updated 6 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Updated 9 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- Removal of certain event logs within a Windows OS☆8Updated 5 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 7 years ago
- A simple reflective dll example☆19Updated 8 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆42Updated 6 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- ☆63Updated 8 years ago
- Discover MSSQL Instances via UDP Scanning☆24Updated 6 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Updated 6 years ago
- ☆40Updated 6 years ago
- Generates anti-sandbox analysis HTA files without payloads☆15Updated 8 years ago
- Set of ultra technical notes about AD☆18Updated 6 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Updated 5 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
- Obtains a crackable hash for the current user account☆23Updated 6 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Updated 7 years ago
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆27Updated 8 years ago
- ☆18Updated 7 years ago
- ☆20Updated 6 years ago
- ☆17Updated 6 years ago
- medium-rare☆28Updated 5 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 6 years ago