Windows Runtime API Interop Utilities for Windows PowerShell
☆30Jan 10, 2020Updated 6 years ago
Alternatives and similar repositories for PoshWinRT
Users that are interested in PoshWinRT are comparing it to the libraries listed below
Sorting:
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆19Apr 20, 2016Updated 9 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆62Feb 6, 2019Updated 7 years ago
- ComPower is a Windows PowerShell module to work with the Component Object Model (COM).☆33Nov 21, 2014Updated 11 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65May 24, 2019Updated 6 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- ☆182Dec 18, 2018Updated 7 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- A simple scanner to find and brute force tomcat manager logins☆27Dec 11, 2019Updated 6 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 2 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- ☆49Sep 28, 2015Updated 10 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- ObscurityLabs RedTeam C# Toolkit☆123Sep 3, 2019Updated 6 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Jar Protector - Jar Crypter☆15May 18, 2018Updated 7 years ago
- ☆93Nov 1, 2018Updated 7 years ago
- External C2 Using IE COM Objects☆101Feb 24, 2019Updated 7 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- A mirror of strobe☆11Dec 3, 2022Updated 3 years ago
- Contains poc's and my research works☆31Feb 13, 2023Updated 3 years ago
- SharpTask is a simple code set to interact with the Task Scheduler service api and is compatible with Cobalt Strike.☆93Feb 15, 2021Updated 5 years ago
- ☆15Jul 5, 2019Updated 6 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- We store attacks and exploits that we've found useful in our research☆13Jun 4, 2015Updated 10 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago