sensepost / Misc-Windows-HackingLinks
Miscellaneous projects related to attacking Windows.
☆27Updated 6 years ago
Alternatives and similar repositories for Misc-Windows-Hacking
Users that are interested in Misc-Windows-Hacking are comparing it to the libraries listed below
Sorting:
- VBA Reversed TCP Meterpreter Stager☆64Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆36Updated 8 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 8 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆70Updated 11 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Updated 9 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Updated 9 years ago
- ☆65Updated 9 years ago
- Simple C# reverse shell with shellcode and process injection☆39Updated 9 years ago
- Firefox, Chrome, Safari browser extensions, Rails control server, meterpreter scripts, SET plugin☆56Updated 3 years ago
- Babel Scripting Framework☆43Updated 5 years ago
- Custom stagers with python encrypting proxy☆40Updated 10 years ago
- VBS Reversed TCP Meterpreter Stager☆88Updated 8 years ago
- ☆83Updated 9 years ago
- Powershell Persistence Locator☆66Updated 9 years ago
- A Generic Windows Memory Scraping Tool☆71Updated 8 years ago
- ☆19Updated 8 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated 2 years ago
- A simple reflective dll example☆19Updated 8 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 11 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- BlackHat Europe 2017 Slides☆25Updated 7 years ago
- ☆24Updated 8 years ago
- Slides from previous conference talks☆41Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- ☆55Updated 8 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆54Updated 11 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- InfoPath Phishing Repo Resource☆68Updated 8 years ago
- Mimikatz HashClash☆12Updated 10 years ago