Ps1jacker is a tool for generating COM Hijacking payload.
☆60Feb 11, 2025Updated last year
Alternatives and similar repositories for Ps1jacker
Users that are interested in Ps1jacker are comparing it to the libraries listed below
Sorting:
- ☆28Apr 1, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 6 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆356Feb 11, 2026Updated 2 weeks ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Shim database persistence (Fin7 TTP)☆37Feb 25, 2020Updated 6 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- ☆229May 10, 2018Updated 7 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Tools for discovery and abuse of COM hijacks☆333Oct 15, 2019Updated 6 years ago
- Injects C# EXE or DLL Assembly into every CLR runtime and AppDomain of another process.☆237Jan 15, 2019Updated 7 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Jun 22, 2019Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- A collection of Windows Administrator tools☆18Jan 1, 2014Updated 12 years ago
- ☆53Oct 27, 2018Updated 7 years ago
- load macho files in memory without touching the Disk☆43Sep 16, 2022Updated 3 years ago
- Mario & Luigi - Tools for sniffing Windows Named Pipes communication☆129Nov 15, 2016Updated 9 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆176Jul 21, 2020Updated 5 years ago
- Windows RID Hijacking persistence technique☆178Nov 20, 2024Updated last year
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 6 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Apr 9, 2019Updated 6 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- POC for CVE-2018-0824☆88Oct 18, 2022Updated 3 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Nov 26, 2018Updated 7 years ago
- ☆210Jan 30, 2019Updated 7 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 6 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆372Feb 23, 2024Updated 2 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- Constrained Language Mode + AMSI bypass all in one☆157Jul 29, 2019Updated 6 years ago
- ☆42Aug 10, 2019Updated 6 years ago