rtcrowley / Offensive-Netsh-Helper
Maintain Windows Persistence with an evil Netshell Helper DLL
☆12Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Offensive-Netsh-Helper
- ☆11Updated 5 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆30Updated 4 years ago
- Execute an arbitrary command within the context of another process☆19Updated 5 years ago
- ☆31Updated 4 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 4 years ago
- Self-Loading Registration Free COM Functions☆11Updated 5 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- ☆54Updated 6 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 6 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆19Updated 7 years ago
- ACTIVELabs Security Advisories☆21Updated 3 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆29Updated 4 years ago
- Process Hollowing Packer☆25Updated 7 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 7 years ago
- ☆18Updated 8 years ago
- Enumerate all processes and get specified file's handle,then close it.☆11Updated 6 years ago
- IIS Handler for *.ps1 files☆9Updated 4 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆13Updated 5 years ago
- Use to generate DLL through Visual Studio☆18Updated 7 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Updated 4 years ago