synacktiv / Radmin3-Password-CrackerLinks
Radmin Server 3 credentials dumper/cracker
☆51Updated 3 years ago
Alternatives and similar repositories for Radmin3-Password-Cracker
Users that are interested in Radmin3-Password-Cracker are comparing it to the libraries listed below
Sorting:
- CVE-2021-1675 (PrintNightmare)☆76Updated 3 years ago
- use aswArPot.sys to kill process☆67Updated 2 years ago
- TeamServer.prop is an optional properties file used by the Cobalt Strike teamserver to customize the settings used to validate screenshot…☆66Updated 10 months ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆63Updated 2 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆83Updated 2 years ago
- PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527☆59Updated 3 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Updated 3 years ago
- Indirect NT syscalls LSASS dumper.☆44Updated last year
- StenographyShellcodeLoader☆43Updated 4 years ago
- Exploits undocumented elevated COM interface ICMLuaUtil via process spoofing to edit registry then calls ColorDataProxy to trigger UAC b…☆138Updated 2 years ago
- Enable RDP and set firewall by Windows API.☆19Updated 3 years ago
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆46Updated 10 months ago
- Load PE via XML Attribute☆31Updated 5 years ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆72Updated last year
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆69Updated 2 years ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Updated 2 years ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆32Updated 2 months ago
- dll proxying☆59Updated 4 years ago
- CVE-2022-25943☆59Updated 3 years ago
- Load shellcode via syscall☆54Updated 3 years ago
- Beacon Object Files.☆35Updated last year
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆51Updated 2 years ago
- Persistence via Shell Extensions☆61Updated last year
- Use COM Component Bypass UAC,Dll Version☆35Updated 4 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- AutoStart teamserver and listeners with services☆73Updated 3 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆88Updated 2 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Updated 8 months ago
- Beacon Object File implementation of pwn1sher's KillDefender☆66Updated 2 years ago
- A Mimikatz For Only Extracting Login Passwords.(Bypasses Most AV's)☆57Updated 3 years ago