slyd0g / DLLHijackTest
DLL and PowerShell script to assist with finding DLL hijacks
☆335Updated 4 years ago
Alternatives and similar repositories for DLLHijackTest:
Users that are interested in DLLHijackTest are comparing it to the libraries listed below
- Cobalt Strike kit for Lateral Movement☆665Updated 5 years ago
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆478Updated 2 years ago
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆709Updated 7 months ago
- PIC lsass dumper using cloned handles☆582Updated 2 years ago
- Command line interface to dump LSASS memory to disk via SilentProcessExit☆445Updated 4 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆599Updated 2 years ago
- Various Cobalt Strike BOFs☆634Updated 2 years ago
- One Token To Rule Them All https://labs.mwrinfosecurity.com/blog/incognito-v2-0-released/☆149Updated 4 years ago
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆419Updated 4 years ago
- ☆356Updated 3 years ago
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆455Updated 2 years ago
- Collection of Beacon Object Files☆583Updated 2 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆758Updated last year
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF)☆315Updated 3 years ago
- Cobalt Strike kit for Persistence☆475Updated 5 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆341Updated 4 years ago
- ☆518Updated 3 years ago
- .NET Project for Attacking vCenter☆541Updated 3 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆943Updated 3 years ago
- TCP Port Redirection Utility☆712Updated 2 years ago
- .NET Project for performing Authenticated Remote Execution☆393Updated 2 years ago
- ☆348Updated 3 years ago
- Self-developed tools for Lateral Movement/Code Execution☆706Updated 3 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆245Updated 4 years ago
- Custom Metasploit post module to executing a .NET Assembly from Meterpreter session☆346Updated 4 years ago
- Example DLL to load from Windows NetShell☆179Updated 8 years ago
- Executes position independent shellcode from an encrypted zip☆303Updated 4 years ago
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆997Updated 3 years ago
- A .NET Framework 4.0 Windows Agent☆472Updated last week
- Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.☆460Updated 11 months ago