mfdooom / threadless_loader_rsLinks
Threadless Injection Payload Toolkit
☆12Updated last year
Alternatives and similar repositories for threadless_loader_rs
Users that are interested in threadless_loader_rs are comparing it to the libraries listed below
Sorting:
- Scripts to interact with Microsoft Graph APIs☆43Updated 8 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 4 months ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆20Updated 3 months ago
- A VSCode devcontainer for development of COFF files with batteries included.☆49Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- ☆36Updated 6 months ago
- Example of using Sleep to create better named pipes.☆41Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆35Updated 2 months ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆22Updated last year
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆33Updated 11 months ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆24Updated last month
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆16Updated 3 months ago
- ☆59Updated 3 years ago
- Dump Teams conversations☆19Updated 4 years ago
- ☆26Updated 5 months ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆54Updated 5 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆85Updated 2 years ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- ☆18Updated 6 months ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Updated 2 years ago
- Click Once + App Domain☆62Updated last year
- ☆21Updated last year
- ☆47Updated 2 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 2 years ago
- ☆38Updated 3 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated last year