quarkslab / quarkspwdumpLinks
Dump various types of Windows credentials without injecting in any process.
☆424Updated 2 years ago
Alternatives and similar repositories for quarkspwdump
Users that are interested in quarkspwdump are comparing it to the libraries listed below
Sorting:
- Automated DLL Enumerator☆533Updated 7 years ago
- A tool mainly to erase specified records from Windows event logs, with additional functionalities.☆600Updated 6 years ago
- CVE-2018-8120 Windows LPE exploit☆497Updated 7 years ago
- A proof of concept for the RDP Inception Attack☆348Updated 7 years ago
- Netview enumerates systems using WinAPI calls☆295Updated 3 years ago
- CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7☆293Updated 6 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,005Updated 6 years ago
- Create a TCP circuit through validly formed HTTP requests☆347Updated 8 years ago
- Miscellaneous projects related to attacking Windows.☆190Updated 10 years ago
- Shellcode launcher utility☆477Updated 11 years ago
- NTDS.dit offline dumper with non-elevated☆217Updated 7 years ago
- SimpleShellcodeInjector receives as an argument a shellcode in hex and executes it. It DOES NOT inject the shellcode in a third party ap…☆256Updated 4 years ago
- CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.☆329Updated 7 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆740Updated 8 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike 2.x. Cortana Scripts are not compatible with Cobalt Stri…☆453Updated 4 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- RottenPotato local privilege escalation from service account to SYSTEM☆677Updated 7 years ago
- A python reverse shell that uses DNS as the c2 channel☆507Updated 9 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆303Updated 9 years ago
- CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882☆540Updated 7 years ago
- office-exploits Office漏洞集合 https://www.sec-wiki.com☆421Updated 6 years ago
- A PoC WMI backdoor presented at Black Hat 2015☆273Updated 9 years ago
- POC of https://research.checkpoint.com/extracting-code-execution-from-winrar/☆268Updated 6 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆914Updated 4 years ago
- A native backdoor module for Microsoft IIS (Internet Information Services)☆543Updated 4 years ago
- Not PowerShell☆446Updated 8 years ago
- Learn from Casey Smith @subTee☆242Updated 7 years ago
- Remove individual lines from Windows XML Event Log (EVTX) files☆269Updated 4 years ago
- Some useful scripts for CobaltStrike☆845Updated 4 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆410Updated last year