nccgroup / memscan
Searches for strings, regex, credit card numbers of magnetic stripe card tracks in a Windows process's memory space
☆124Updated 3 years ago
Alternatives and similar repositories for memscan:
Users that are interested in memscan are comparing it to the libraries listed below
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆198Updated 7 years ago
- A WebDAV PROPFIND C2 tool☆118Updated 5 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆72Updated 8 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆138Updated 6 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆112Updated 8 years ago
- Meterpreter Scripts that I'm working on☆172Updated 6 years ago
- ☆119Updated 9 years ago
- Attack Knowledge Base☆100Updated 7 years ago
- Interactive remote PowerShell Payload☆75Updated 9 years ago
- Liniaal - A communication extension to Ruler☆96Updated 6 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆105Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆66Updated 9 years ago
- Windows Share Enumerator☆126Updated 6 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆51Updated 9 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆103Updated 7 years ago
- ☆84Updated 9 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆284Updated 6 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆68Updated 7 years ago
- Offensive Data Storage☆58Updated 8 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆147Updated 5 years ago
- Python tool to inject fake updates into unencrypted WSUS traffic☆115Updated 9 years ago
- ☆79Updated 9 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆159Updated 7 years ago
- A command line tool for creating malicious outlook rules☆160Updated 6 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆61Updated 8 years ago
- SMB Relay Attack Script☆148Updated 6 years ago
- Decrypt MITM SSL RDP and save to pcap