subTee / ApplicationWhitelistBypassTechniques
☆280Updated this week
Related projects: ⓘ
- ☆250Updated this week
- ☆232Updated this week
- Forward local or remote tcp ports through SMB pipes.☆291Updated 3 years ago
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆252Updated 8 years ago
- DefCon24☆119Updated 8 years ago
- ☆354Updated this week
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆205Updated 8 years ago
- Automated Responder/secretsdump.py cracking☆181Updated 8 years ago
- ☆134Updated this week
- ☆428Updated this week
- ☆175Updated this week
- HTTP/S Beaconing Implant☆302Updated 7 years ago
- UAC 0day, all day!☆275Updated 7 years ago
- ☆138Updated 7 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆349Updated 6 years ago
- Materials of Workshop presented at DEFCON 25☆107Updated 7 years ago
- ☆328Updated this week
- Auto Domain Admin and Network Exploitation.☆295Updated 6 years ago
- ☆110Updated this week
- A PowerShell example of the Windows zero day priv esc☆320Updated 6 years ago
- ☆247Updated this week
- An automated SMB relay exploitation script.☆151Updated 7 years ago
- ☆237Updated this week
- ☆231Updated this week
- A collection of post-exploitation tools for network red teaming.☆137Updated 5 years ago
- Public repository for improvements to the EXTRABACON exploit☆158Updated 7 years ago
- A PoC WMI backdoor presented at Black Hat 2015☆270Updated 9 years ago
- WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections☆234Updated 7 years ago
- PowerShell Empire Web Interface☆326Updated last year
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆145Updated 5 years ago