ps1337 / reinschauerLinks
it is very good
☆517Updated 3 years ago
Alternatives and similar repositories for reinschauer
Users that are interested in reinschauer are comparing it to the libraries listed below
Sorting:
- ☆473Updated last year
- Kraken, a modular multi-language webshell coded by @secu_x11☆550Updated last year
- Protected Process Dumper Tool☆576Updated 2 years ago
- XLL Phishing Tradecraft☆431Updated 3 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆497Updated 3 years ago
- UAC bypass by abusing RPC and debug objects.☆629Updated 2 years ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆501Updated 2 years ago
- Lifetime AMSI bypass☆669Updated 2 years ago
- shellcode loader for your evasion needs☆352Updated 9 months ago
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆535Updated 2 months ago
- A unique technique to execute binaries from a password protected zip☆1,039Updated 3 years ago
- Tool to remotely dump secrets from the Windows registry☆521Updated 2 months ago
- DavRelayUp - a universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the …☆563Updated 2 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆450Updated 2 years ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆394Updated last year
- Useful C2 techniques and cheat sheets learned from engagements☆570Updated 4 months ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆397Updated 2 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆314Updated 2 months ago
- ☆611Updated 2 months ago
- Sandman is a NTP based backdoor for hardened networks.☆816Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆388Updated last year
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆283Updated 3 years ago
- UAC Bypass By Abusing Kerberos Tickets☆507Updated 2 years ago
- ☆333Updated 2 years ago
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆584Updated 11 months ago
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆622Updated last year
- A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.☆211Updated 3 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆478Updated 3 years ago
- Various ways to execute shellcode☆508Updated last year
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆550Updated last week