rtcrowley / Offensive-Netsh-Helper
Maintain Windows Persistence with an evil Netshell Helper DLL
☆12Updated 6 years ago
Alternatives and similar repositories for Offensive-Netsh-Helper:
Users that are interested in Offensive-Netsh-Helper are comparing it to the libraries listed below
- ☆11Updated 5 years ago
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Updated 9 years ago
- Enumerate all processes and get specified file's handle,then close it.☆11Updated 6 years ago
- ☆54Updated 6 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆30Updated 4 years ago
- ☆31Updated 4 years ago
- ACTIVELabs Security Advisories☆21Updated 3 years ago
- Use to generate DLL through Visual Studio☆18Updated 7 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 6 years ago
- A simple parser(library) which extracts shimcache data from windows.☆14Updated 5 years ago
- Files for http://deniable.org/windows/windows-callbacks☆24Updated 4 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆29Updated 4 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 4 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆19Updated 7 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- Self-Loading Registration Free COM Functions☆11Updated 5 years ago
- This is a project to receive Base64 data and decode it in process☆15Updated 4 years ago
- Windows Shellcode Testing Utility to Run Shellcode From A File☆12Updated 4 years ago
- Experiments on the Windows Internals☆30Updated 5 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- Example for PagedOut!☆24Updated 5 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Updated 4 years ago
- Hide Mimikatz From Process Lists☆17Updated 9 years ago
- IIS Handler for *.ps1 files☆9Updated 5 years ago
- ☆20Updated 3 years ago
- ☆18Updated 9 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆13Updated 6 years ago
- ☆26Updated 6 years ago