rvrsh3ll / UACSilentCleanupView external linksLinks
☆14Sep 22, 2019Updated 6 years ago
Alternatives and similar repositories for UACSilentCleanup
Users that are interested in UACSilentCleanup are comparing it to the libraries listed below
Sorting:
- C# DCOM Execution☆18Aug 4, 2019Updated 6 years ago
- AMSI bypass stager generator☆29Feb 5, 2019Updated 7 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated 3 weeks ago
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago
- Contains poc's and my research works☆31Feb 13, 2023Updated 3 years ago
- ☆37Aug 18, 2019Updated 6 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- ObscurityLabs RedTeam C# Toolkit☆124Sep 3, 2019Updated 6 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Nov 9, 2019Updated 6 years ago
- A quick tool for hiding a new process running shellcode.☆57Jun 10, 2020Updated 5 years ago
- Simple skeleton for a CPP DLL☆66Jan 11, 2020Updated 6 years ago
- Snippets of scripting randomness☆13Jun 9, 2022Updated 3 years ago
- A simple parser(library) which extracts shimcache data from windows.☆15May 20, 2019Updated 6 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- PoC for detecting and evading ETW detection of .Net Assembly.Load☆21Aug 26, 2020Updated 5 years ago
- A tool to create obfuscated HTA script.☆178Jul 2, 2021Updated 4 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- WMI Event Subscription Persistence in C#☆112May 29, 2019Updated 6 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- (Small change to make it easier to test the payload and combine it with SILENTTRINITY.)A tool for generating .NET serialized gadgets that…☆43Mar 2, 2020Updated 5 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆119Apr 9, 2019Updated 6 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Nov 6, 2019Updated 6 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 5 years ago
- A tool that helps you get system shell without UAC prompt☆49Oct 8, 2018Updated 7 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago