scipag / ProxyExe
Launch a Windows EXE file with this EXE file (application filter evasion)
☆11Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for ProxyExe
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- ☆14Updated 5 years ago
- Monitor Files and Folders for Changes in Real Time .☆10Updated 5 years ago
- Just some random stuff for AppLocker☆16Updated 5 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- Abuses Powershell Profiles☆13Updated 9 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆12Updated last year
- A PowerShell script to prevent Sysmon from writing its events☆14Updated 4 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆16Updated last year
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22Updated 6 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- ☆8Updated 3 years ago
- Brute Force and Scan WinRm Service☆13Updated 4 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆17Updated 4 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 4 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆13Updated 6 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- ☆16Updated 6 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆10Updated 7 years ago
- ☆16Updated 6 years ago