rmdavy / VBAFunctionPointers
☆19Updated 3 years ago
Related projects: ⓘ
- ☆25Updated this week
- ☆17Updated 3 years ago
- ☆14Updated 4 years ago
- Extended Process List (Search functionality)☆27Updated 3 years ago
- ☆23Updated 2 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Updated 3 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆18Updated 3 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆16Updated 7 years ago
- Visual Studio (C++) Solution Template for Payloads☆17Updated 4 years ago
- ☆42Updated this week
- ☆14Updated 4 years ago
- A C port of b33f's UrbanBishop☆35Updated 3 years ago
- ☆28Updated 6 years ago
- Tool to manage user privileges☆28Updated 5 years ago
- Experiments on the Windows Internals☆30Updated 4 years ago
- C# code to run PIC using CreateThread☆16Updated 5 years ago
- AMSI detection PoC☆30Updated 4 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆30Updated 4 years ago
- LoadLibrary for offensive operations☆32Updated 2 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆35Updated 5 years ago
- Loads .NET Assembly Via CLR Loader☆14Updated 5 years ago
- ☆29Updated this week
- ☆15Updated 3 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆30Updated 6 months ago
- I used this to see if an EDR is running in Safe Mode☆34Updated 3 years ago
- leaking net-ntlm with webdav☆24Updated 3 years ago
- ☆44Updated 3 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆14Updated 5 years ago
- treafik fronted c2 examples☆26Updated 3 years ago