Remote execution, like PsExec
☆610Feb 21, 2025Updated last year
Alternatives and similar repositories for PAExec
Users that are interested in PAExec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An implementation of PSExec in C#☆337Dec 1, 2020Updated 5 years ago
- Remote Command Executor: A OSS replacement for PsExec and RunAs - or Telnet without having to install a server. Take your pick :)☆367Oct 30, 2017Updated 8 years ago
- A tool to elevate privilege with Windows Tokens☆1,063Oct 6, 2023Updated 2 years ago
- Tunnellable HTTP/HTTPS socks4a proxy written in C# and deployable via PowerShell☆498Mar 15, 2023Updated 3 years ago
- LSASS memory dumper using direct system calls and API unhooking.☆1,579Jan 5, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Windows Event Log Killer☆1,813Sep 21, 2023Updated 2 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆743Jul 22, 2023Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,610Jul 10, 2023Updated 2 years ago
- A tool to kill antimalware protected processes☆1,506Jun 19, 2021Updated 4 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆404Jun 6, 2020Updated 5 years ago
- LoadLibrary for offensive operations☆1,178Oct 22, 2021Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,432Jul 20, 2024Updated last year
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆347Jul 21, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SharpSploit is a .NET post-exploitation library written in C#☆1,862Aug 12, 2021Updated 4 years ago
- A .net OLE/COM viewer and inspector to merge functionality of OleView and Test Container☆1,379Dec 9, 2024Updated last year
- ☆623Jul 21, 2025Updated 8 months ago
- RpcView is a free tool to explore and decompile Microsoft RPC interfaces☆1,049Sep 24, 2023Updated 2 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆454Dec 23, 2020Updated 5 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆990Dec 4, 2022Updated 3 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Jul 18, 2017Updated 8 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- Also known by Microsoft as Knifecoat☆1,152Dec 22, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- AV/EDR evasion via direct system calls.☆1,801Sep 3, 2022Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,501Jul 8, 2025Updated 8 months ago
- Converts PE into a shellcode☆2,751Aug 30, 2025Updated 6 months ago
- Extract Windows Defender database from vdm files and unpack it☆477Feb 23, 2026Updated last month
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆809Aug 28, 2022Updated 3 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆813Dec 17, 2019Updated 6 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated 2 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,511Nov 15, 2023Updated 2 years ago
- Reuse open handles to dynamically dump LSASS.☆247Apr 4, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆1,139Nov 13, 2022Updated 3 years ago
- The swiss army knife of LSASS dumping☆2,083Sep 17, 2024Updated last year
- ☆1,800Aug 30, 2024Updated last year
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- PowerShell Pass The Hash Utils☆1,736Dec 9, 2018Updated 7 years ago
- Pure C++, weaponized, fully automated implementation of RottenPotatoNG☆314Sep 16, 2021Updated 4 years ago
- SharpWMI is a C# implementation of various WMI functionality.☆763Jan 15, 2021Updated 5 years ago