mantvydasb / RdpThiefView external linksLinks
Extracting Clear Text Passwords from mstsc.exe using API Hooking.
☆18Nov 17, 2019Updated 6 years ago
Alternatives and similar repositories for RdpThief
Users that are interested in RdpThief are comparing it to the libraries listed below
Sorting:
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 6 years ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- 未授权批量检测脚本☆14Oct 9, 2019Updated 6 years ago
- Random☆35Nov 30, 2022Updated 3 years ago
- Flexible C# shellcode runner☆39Jan 18, 2022Updated 4 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- MSBuild AL bypass☆18Mar 9, 2023Updated 2 years ago
- ☆20Dec 8, 2018Updated 7 years ago
- C# loader that copies a chunk at the time of the shellcode in memory, rather that all at once☆23Jul 14, 2022Updated 3 years ago
- ☆21Dec 10, 2018Updated 7 years ago
- ☆18Sep 21, 2019Updated 6 years ago
- ☆21Mar 25, 2022Updated 3 years ago
- 利用xray高级版批量收集子域名☆18Feb 19, 2020Updated 5 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25May 6, 2021Updated 4 years ago
- This repository provides the core to build your own External C2 Server and Connector for Brute Ratel C4☆55May 8, 2022Updated 3 years ago
- windows密码恢复工具 查看各种密码工具☆19Aug 29, 2019Updated 6 years ago
- Notes only☆19May 2, 2022Updated 3 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆31Jun 14, 2022Updated 3 years ago
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆53Jul 13, 2025Updated 7 months ago
- Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.☆62Sep 6, 2021Updated 4 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- BOF combination of KillDefender and Backstab☆170Mar 23, 2023Updated 2 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆109Oct 10, 2021Updated 4 years ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 6 months ago
- CRUD básico em PHP com um sistema de cadastro de clientes.☆13May 19, 2021Updated 4 years ago
- Online diary is a PHP app by which you can write your feeling and keep it private or share with people and you can also read other post o…☆10Jul 5, 2015Updated 10 years ago
- 一款 Go 语言编写的小巧、简洁、快速采集 fofa 数据导出到 Excel 表单的小工具。☆33Mar 16, 2023Updated 2 years ago
- (Demo) 3rd party agent for Havoc☆147Aug 20, 2023Updated 2 years ago
- bypass UAC even when configured to always notify user☆29Aug 31, 2021Updated 4 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34May 18, 2020Updated 5 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- A fake AMSI Provider which can be used for persistence.☆155May 16, 2021Updated 4 years ago
- Código fonte da calculadora de IMC☆13Oct 16, 2019Updated 6 years ago
- intern☆10Sep 25, 2018Updated 7 years ago