moohax / Code-Execution
Executables that execute other stuff
☆52Updated 6 years ago
Alternatives and similar repositories for Code-Execution:
Users that are interested in Code-Execution are comparing it to the libraries listed below
- ☆76Updated 6 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- ☆30Updated 6 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- ☆53Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Collection of IronPython scripts and executables for penetration testing☆55Updated 6 years ago
- Inject .Net payloads into other .Net assemblies on disk☆61Updated 5 years ago
- Microsoft Applocker evasion tool☆39Updated 5 years ago
- ☆110Updated 6 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Updated 7 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- A C# implementation of the PowerShell Empire Agent☆74Updated 6 years ago
- Data exfiltration using reflective DNS resolution covert channel☆52Updated 7 years ago
- Helper script for mangling CS payloads☆51Updated 5 years ago
- Enumerate RIDs using pure Python☆31Updated 8 months ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆53Updated 6 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆90Updated 5 years ago
- ☆45Updated 6 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆124Updated 6 years ago
- ☆83Updated 9 years ago
- medium-rare☆28Updated 5 years ago
- ☆94Updated 6 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- Aggressor scripts for Cobalt Strike☆57Updated 5 years ago
- ☆39Updated 7 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Windows Stagers to circumvent restrictive network environments☆64Updated 7 months ago
- Initial Commit of Coresploit☆56Updated 3 years ago