Extracting Clear Text Passwords from mstsc.exe using API Hooking.
☆18Nov 17, 2019Updated 6 years ago
Alternatives and similar repositories for RdpThief
Users that are interested in RdpThief are comparing it to the libraries listed below
Sorting:
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 6 years ago
- a bunch of malware in all platform, some maybe not work, this code for some study case or for knowledge. for information about malware yo…☆14Jan 29, 2021Updated 5 years ago
- 自己写的Alfred插件,包含时间转换/编解码/hash/ip查询等常用功能☆13Sep 2, 2022Updated 3 years ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 8 years ago
- 未授权批量检测脚本☆14Oct 9, 2019Updated 6 years ago
- Random☆35Nov 30, 2022Updated 3 years ago
- Flexible C# shellcode runner☆39Jan 18, 2022Updated 4 years ago
- MSBuild AL bypass☆18Mar 9, 2023Updated 3 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆16Jun 16, 2022Updated 3 years ago
- A collection of Cobalt Strike aggressor scripts☆17Jul 7, 2020Updated 5 years ago
- C# loader that copies a chunk at the time of the shellcode in memory, rather that all at once☆23Jul 14, 2022Updated 3 years ago
- ☆20Dec 8, 2018Updated 7 years ago
- ☆18Sep 21, 2019Updated 6 years ago
- ☆21Dec 10, 2018Updated 7 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25May 6, 2021Updated 4 years ago
- ☆21Mar 25, 2022Updated 3 years ago
- 利用xray高级版批量收集子域名☆18Feb 19, 2020Updated 6 years ago
- This repository provides the core to build your own External C2 Server and Connector for Brute Ratel C4☆55May 8, 2022Updated 3 years ago
- Notes only☆19May 2, 2022Updated 3 years ago
- Former Multi - Ring to Kernel To UserMode Transitional Shellcode For Remote Kernel Exploits☆31Jun 14, 2022Updated 3 years ago
- windows密码恢复工具 查看各种密码工具☆19Aug 29, 2019Updated 6 years ago
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆53Jul 13, 2025Updated 7 months ago
- Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.☆62Sep 6, 2021Updated 4 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- BOF combination of KillDefender and Backstab☆167Mar 23, 2023Updated 2 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆109Oct 10, 2021Updated 4 years ago
- 一款 Go 语言编写的小巧、简洁、快速采集 fofa 数据导出到 Excel 表单的小工具。☆33Mar 16, 2023Updated 2 years ago
- bypass UAC even when configured to always notify user☆29Aug 31, 2021Updated 4 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Sep 14, 2023Updated 2 years ago
- Beacon Object File implementation of Event Viewer deserialization UAC bypass☆133May 6, 2022Updated 3 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34May 18, 2020Updated 5 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- A fake AMSI Provider which can be used for persistence.☆156May 16, 2021Updated 4 years ago
- 50 React projects for beginners from easy to hard. Practice all of these projects to excel your React skills.☆12Sep 5, 2022Updated 3 years ago
- ☆11Aug 17, 2025Updated 6 months ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago