sannemaasakkers / SansomwareView external linksLinks
☆37Jan 15, 2022Updated 4 years ago
Alternatives and similar repositories for Sansomware
Users that are interested in Sansomware are comparing it to the libraries listed below
Sorting:
- ☆15Feb 9, 2022Updated 4 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- ☆14Jul 18, 2019Updated 6 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- ☆46Nov 14, 2020Updated 5 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆46Mar 1, 2021Updated 4 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- ps-like .NET Assembly for enumerating processes on the current machine or a remote machine.☆13Aug 12, 2019Updated 6 years ago
- ☆31Updated this week
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- D/Invoke port of UrbanBishop☆30Dec 13, 2020Updated 5 years ago
- A collection of offensive Nim example code☆74Dec 21, 2021Updated 4 years ago
- Nim version of MDSec's Parallel Syscall PoC☆124Jan 14, 2022Updated 4 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- Misery Loader to bypass modern EDR solutions☆17Dec 20, 2024Updated last year
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- ☆30Nov 7, 2022Updated 3 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago
- ☆13Jan 20, 2020Updated 6 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Dec 27, 2021Updated 4 years ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Jul 24, 2020Updated 5 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 5 years ago
- C# version of MDSec's ParallelSyscalls☆141Jan 9, 2022Updated 4 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- An example of using Syscalls in C# to get a meterpreter shell.☆112Oct 7, 2021Updated 4 years ago
- ☆16Nov 23, 2021Updated 4 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- PowerShell Module for parsing logs generated by Sysinternals Sysmon for Linux☆37Mar 20, 2022Updated 3 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆107Mar 8, 2023Updated 2 years ago
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆33Jul 5, 2025Updated 7 months ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Dec 10, 2021Updated 4 years ago