synacktiv / Radmin3-Password-Cracker
Radmin Server 3 credentials dumper/cracker
☆46Updated 3 years ago
Alternatives and similar repositories for Radmin3-Password-Cracker:
Users that are interested in Radmin3-Password-Cracker are comparing it to the libraries listed below
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆63Updated 6 months ago
- use aswArPot.sys to kill process☆67Updated 2 years ago
- CVE-2021-1675 (PrintNightmare)☆75Updated 3 years ago
- StenographyShellcodeLoader☆42Updated 4 years ago
- Use COM Component Bypass UAC,Dll Version☆33Updated 3 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 2 years ago
- A simple hidden vnc.☆32Updated 3 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆79Updated last year
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 3 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆58Updated 3 years ago
- Load PE via XML Attribute☆29Updated 4 years ago
- ☆13Updated 3 years ago
- LOLBINs that inject a DLL into a given process ID.☆136Updated 3 years ago
- Beacon Object File implementation of pwn1sher's KillDefender☆66Updated 2 years ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆67Updated 2 years ago
- dll proxying☆54Updated 3 years ago
- Cs-Sleep-Mask-Fiber☆17Updated 4 months ago
- Invoke-Obfuscation-Bypass + PS2EXE 过主流杀软☆53Updated 3 years ago
- ☆51Updated 2 years ago
- ☆21Updated last year
- AutoStart teamserver and listeners with services☆71Updated 3 years ago
- MappingInjection via csharp☆37Updated 3 years ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆71Updated 11 months ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆79Updated 2 years ago
- C# loader for msfvenom shellcode with AMSI bypass☆35Updated 4 years ago
- generate CobaltStrike's cross-platform payload☆34Updated 7 months ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆43Updated 6 months ago
- Change hash for a signed pe☆15Updated last year
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆137Updated 2 years ago