r4wd3r / RID-HijackingLinks
Windows RID Hijacking persistence technique
☆174Updated 6 months ago
Alternatives and similar repositories for RID-Hijacking
Users that are interested in RID-Hijacking are comparing it to the libraries listed below
Sorting:
- DLL Generator for side loading attack☆174Updated 6 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆258Updated 6 years ago
- Obfuscated Penetration Testing PowerShell scripts☆147Updated 6 months ago
- Quick Malicious ClickOnceGenerator for Red Team☆249Updated 4 years ago
- lateral movement techniques that can be used during red team exercises☆272Updated 5 years ago
- Assorted scripts and one off things☆268Updated 9 months ago
- GhostBuild is a collection of simple MSBuild launchers for various GhostPack/.NET projects☆248Updated 4 years ago
- DEPRECATED SharpRoast is a C# port of various PowerView's Kerberoasting functionality.☆252Updated 6 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆166Updated 4 years ago
- Lateral Movement technique using DCOM and HTA☆233Updated 2 years ago
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆154Updated 6 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆131Updated 3 months ago
- ☆229Updated 7 years ago
- Elite is the client-side component of the Covenant project. Covenant is a .NET command and control framework that aims to highlight the a…☆121Updated last year
- An Insider Threat Toolkit☆151Updated 6 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆325Updated 6 years ago
- Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.☆204Updated 7 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- PSAmsi is a tool for auditing and defeating AMSI signatures.☆390Updated 7 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Updated 6 years ago
- Constrained Language Mode + AMSI bypass all in one☆157Updated 5 years ago
- ☆169Updated 7 years ago
- ☆79Updated 8 years ago
- Inject PowerShell into any process☆232Updated 6 years ago
- Example DLL to load from Windows NetShell☆180Updated 8 years ago
- a tool to make it easy and fast to test various forms of injection☆173Updated 6 years ago
- Neutering Sysmon via driver unload☆229Updated 2 years ago
- ☆257Updated 2 years ago
- Presentation material presented by Outflank team members at public events.☆187Updated 5 months ago
- How To Execute Shellcode via HTA☆139Updated 7 years ago