skyjos-com / Redfish
Redfish is a simple and flexible SMB server on Windows.
☆84Updated 5 years ago
Alternatives and similar repositories for Redfish
Users that are interested in Redfish are comparing it to the libraries listed below
Sorting:
- Windows 右键“发送到”接力;分组“发送到”;用指定程序打开;启动器;组织你的工具箱。 Send what sent to me to my 'sendto' for Windows; open with specified program; group sendto…☆32Updated last year
- Try to hide Sndboxie☆74Updated 2 years ago
- Windows Password Brute by Stas'M☆41Updated 7 years ago
- Utility to remove digital code signature from binary PE files in Windows.☆16Updated 4 years ago
- HTTP(S) proxy that uses input/output completion ports (IOCP).☆20Updated 6 years ago
- Graphical User Interface for Mpress☆32Updated 6 years ago
- Unlock files and folders☆13Updated 2 years ago
- Runs programs as TrustedInstaller☆49Updated 5 years ago
- Command line utility for copying files on NTFS using low level disk access☆34Updated last year
- ☆42Updated 8 years ago
- ☆10Updated 2 years ago
- Convert native dll to shellcode, and support exported function☆22Updated 4 years ago
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆14Updated 6 months ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆21Updated 4 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆55Updated 3 years ago
- A Generic WOW64 Process Blocker☆14Updated 3 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆27Updated 6 years ago
- Example/starter code for custom Windows application compatibility shims☆33Updated 4 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆54Updated last year
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆41Updated 6 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Updated 3 years ago
- ☆35Updated last year
- Without closing windows defender, to make defender useless by removing its token privileges and lowering the token integrity.☆33Updated 3 years ago
- Hide code from dnSpy and other C# spying tools☆42Updated 4 years ago
- Radmin Server 3 credentials dumper/cracker☆50Updated 3 years ago
- A small tool that allows to run WinAPI functions through command line parameters☆191Updated 2 years ago
- Server/Client SOCKS5 (RFC 1928) in Reverse mode on Windows☆36Updated 6 years ago
- ☆32Updated 3 years ago
- Pre-compiled tools to tunnel TCP over RDP Connections☆81Updated 6 years ago
- Create file system symbolic links from low privileged user accounts within PowerShell☆94Updated 2 years ago