outflanknl / SharpHideLinks
Tool to create hidden registry keys.
☆487Updated 5 years ago
Alternatives and similar repositories for SharpHide
Users that are interested in SharpHide are comparing it to the libraries listed below
Sorting:
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆346Updated 5 years ago
- ☆350Updated 3 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆480Updated 3 years ago
- .NET Project for performing Authenticated Remote Execution☆402Updated 2 years ago
- Cobalt Strike kit for Lateral Movement☆675Updated 5 years ago
- .NET project for installing Persistence☆483Updated last year
- Cobalt Strike kit for Persistence☆478Updated 5 years ago
- ☆363Updated 4 years ago
- Process Injection☆765Updated 3 years ago
- SharpDump is a C# port of PowerSploit's Out-Minidump.ps1 functionality.☆666Updated 6 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆328Updated 2 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Updated 3 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆356Updated 4 years ago
- eBook "Bypassing AVS by C#.NET Programming" (Free Chapters only)☆467Updated 2 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆494Updated 2 years ago
- SharpWMI is a C# implementation of various WMI functionality.☆762Updated 4 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆535Updated 6 years ago
- OpSec-safe Powershell runspace from within C# (aka SharpPick) with AMSI, Constrained Language Mode and Script Block Logging disabled at s…☆533Updated 2 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆452Updated 4 years ago
- DLL and PowerShell script to assist with finding DLL hijacks☆336Updated 4 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆803Updated 2 years ago
- ** DISCONTINUED ** C2 framework that uses Background Intelligent Transfer Service (BITS) as communication protocol and Direct Syscalls + …☆217Updated 2 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Updated 4 years ago
- ☆280Updated 4 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆245Updated 5 years ago
- The program is designed to obfuscate the shellcode.☆204Updated 4 years ago
- Lockless allows for the copying of locked files.☆248Updated 4 years ago
- AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.☆389Updated 6 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆742Updated 11 months ago
- Collection of Beacon Object Files☆601Updated 2 years ago