morphHTA - Morphing Cobalt Strike's evil.HTA
☆10Jun 3, 2017Updated 8 years ago
Alternatives and similar repositories for morphHTA
Users that are interested in morphHTA are comparing it to the libraries listed below
Sorting:
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 9 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Useful windows tools for Blue, Red & Purple teams☆11Mar 8, 2026Updated last week
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- A uacbypass that works on medium IL that abuses EventViewers unsafe deserialization to RecentViews☆15Aug 29, 2023Updated 2 years ago
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- Tool searching for different default passwords.☆16Jan 27, 2022Updated 4 years ago
- Web: Nextjs based Portfolio site. Rust: A TUI based portfolio of mine created using rust & tui-rs☆11Dec 11, 2024Updated last year
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- Add my own POC to test Visual Studio trick to run code when building☆22Jul 18, 2017Updated 8 years ago
- Apache Thrift Decoder☆35Dec 7, 2017Updated 8 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- Decrypts blowfish (w. static key) encrypted hMail database password.☆15Feb 21, 2018Updated 8 years ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆20Jan 7, 2026Updated 2 months ago
- A malicious KeePass plugin to exfiltrate the master key.☆15Oct 25, 2021Updated 4 years ago
- Make Windows LNK file with python (pylnk)☆64Jun 4, 2016Updated 9 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- CDPwn is a python script designed to capture screenshots of files via the Chrome DevTools Protocol (CDP), a technique useful for privileg…☆14May 23, 2024Updated last year
- JWT Debugger extension based on JWT.io☆12Nov 21, 2020Updated 5 years ago
- Tool to brute-force the passphrase of a RSA private key in PEM format.☆12Dec 11, 2014Updated 11 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- WMI Event Subscription Persistence in C#☆112May 29, 2019Updated 6 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- A collection of useful scripts☆24Sep 12, 2018Updated 7 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Feb 18, 2021Updated 5 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- A tool for performing an initial information-gathering scan of websites for penetration tests.☆24Aug 27, 2019Updated 6 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Feb 20, 2018Updated 8 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- Web-based BashBunny IDE☆10Mar 16, 2018Updated 8 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆30Jun 11, 2019Updated 6 years ago
- Zone transfer a domain from its own NS servers and bruteforce subdomains☆12Mar 8, 2025Updated last year