rasta-mouse / RuralBishopLinks
D/Invoke port of UrbanBishop
☆108Updated 5 years ago
Alternatives and similar repositories for RuralBishop
Users that are interested in RuralBishop are comparing it to the libraries listed below
Sorting:
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 4 years ago
- C# port of the Get-AppLockerPolicy PS cmdlet☆100Updated 2 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- MiniDumpWriteDump behavior modification hook☆50Updated 4 years ago
- ☆46Updated 4 years ago
- Code Exec via Excel☆88Updated 8 years ago
- Proper Payload Protection Prevents Poor Performance☆74Updated 3 years ago
- Outlook persistence using VSTO add-ins☆87Updated 4 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆123Updated 4 years ago
- Simple .NET assembly to interact with services.☆41Updated 6 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Updated 5 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 4 years ago
- Load C# Code straight to memory☆56Updated 5 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- MSBuild Without MSBuild.exe☆154Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 5 years ago
- Managed code hooking template.☆133Updated 3 years ago
- C++ implant that interfaces with a SK8PARK server☆49Updated 4 years ago
- ☆55Updated 3 years ago
- cobalt strike tools☆31Updated 3 years ago
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53Updated 7 years ago
- ☆26Updated 4 years ago
- ☆48Updated 5 years ago
- Load .net assemblies from memory while having them appear to be loaded from an on-disk location.☆169Updated 4 years ago
- ☆97Updated 3 years ago
- aggressor and pycobalt scripts.☆18Updated 4 years ago
- ☆60Updated 4 years ago
- ☆112Updated 2 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆102Updated 2 years ago
- A more obfuscated CactusTorch targeted towards office☆31Updated 4 years ago