Execute Shellcode And Other Goodies From MMC
☆13Jun 17, 2015Updated 10 years ago
Alternatives and similar repositories for RogueMMC
Users that are interested in RogueMMC are comparing it to the libraries listed below
Sorting:
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- RACF Database Parser☆12Apr 4, 2024Updated last year
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- Source code for '.NET IL Assembler' by Serge Lidin☆21Mar 28, 2017Updated 8 years ago
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- Reconnaissance tool for Microsoft Office 365☆69Nov 21, 2018Updated 7 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- Powershell script to diff and patch binaries☆21Sep 1, 2022Updated 3 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Aug 23, 2019Updated 6 years ago
- modern ansible, AWS, ECS fargate "serverless" scalable app☆19Feb 10, 2026Updated 2 weeks ago
- Machine Learning Network Share Password Hunting Toolkit☆129Mar 21, 2020Updated 5 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking☆142May 23, 2020Updated 5 years ago
- named pipe server with impersonation☆59May 11, 2019Updated 6 years ago
- ☆57May 13, 2020Updated 5 years ago
- A simple PE loader.☆27Dec 9, 2022Updated 3 years ago
- ☆27Jul 21, 2020Updated 5 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- C# POC code for the SessionEnv dll hijack by utilizing called functions of TSMSISrv.dll☆62Apr 18, 2019Updated 6 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆27Feb 9, 2019Updated 7 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆26Sep 23, 2018Updated 7 years ago
- Initial Commit of Coresploit☆57Oct 12, 2021Updated 4 years ago
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago
- Port of Invoke-Excel4DCOM☆104Oct 12, 2019Updated 6 years ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Apr 7, 2021Updated 4 years ago
- Tools for taking over Crestron Windows CE devices☆36Jul 11, 2022Updated 3 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 4 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Event Data Collector☆39Jan 12, 2026Updated last month
- Find jmp gadgets for call stack spoofing.☆74Oct 1, 2025Updated 4 months ago