mortychannel / lnkexploitView external linksLinks
☆43Aug 1, 2019Updated 6 years ago
Alternatives and similar repositories for lnkexploit
Users that are interested in lnkexploit are comparing it to the libraries listed below
Sorting:
- Windows RID Hijacking persistence technique☆178Nov 20, 2024Updated last year
- ☆14Sep 22, 2019Updated 6 years ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- Example VBA Macro for MacOS Mojave☆66Oct 31, 2018Updated 7 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Aug 21, 2015Updated 10 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- A small .NET compression utility☆57Feb 2, 2022Updated 4 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆182Feb 21, 2022Updated 3 years ago
- dem sharp donuts☆202Sep 11, 2022Updated 3 years ago
- Contains poc's and my research works☆31Feb 13, 2023Updated 3 years ago
- ☆37Aug 18, 2019Updated 6 years ago
- ☆94Nov 1, 2018Updated 7 years ago
- ☆69Dec 19, 2018Updated 7 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- Ex-pv8's☆64Aug 28, 2019Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 6 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- ☆44Apr 20, 2020Updated 5 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Monitor the textual data pasted into Windows clipboard☆29Nov 4, 2018Updated 7 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- ☆351Feb 21, 2022Updated 3 years ago
- A proof of concept for dynamically loading .net assemblies at runtime with only a minimal convention pre-knowledge☆164Jul 25, 2018Updated 7 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- EoP POC for CVE-2019-1132☆61Sep 8, 2019Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- Script that searches through all COM objects for any methods containing a key word of your choosing.☆74Feb 28, 2020Updated 5 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65May 24, 2019Updated 6 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- Run shellcode from resource☆260Dec 13, 2020Updated 5 years ago