automated sticky keys backdoor
☆10Feb 12, 2016Updated 10 years ago
Alternatives and similar repositories for logon_backdoor
Users that are interested in logon_backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Use powershell to getsystem with token dumplication☆10Dec 6, 2019Updated 6 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- ☆13Jun 1, 2021Updated 4 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Jun 5, 2023Updated 2 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Jan 15, 2026Updated 2 months ago
- CobaltStrike Aggressor Script to utilise FuzzySec's Windows Notification Framework Research to Spawn a Shell under Explorer.exe☆16Jul 6, 2019Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- Spotify ripper: download an artists entire discography, individual albums, or tracks; written in Go with a patched version of Librespot t…☆31Sep 26, 2020Updated 5 years ago
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆28Sep 13, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Jun 5, 2023Updated 2 years ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- ☆11Mar 17, 2020Updated 6 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆36May 18, 2020Updated 5 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- Research & Study☆17Mar 21, 2026Updated last week
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Utility to generate a TLS Certificate.☆17Apr 11, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- React v16 文档中文翻译,含高级指南及API文档参考☆11Nov 15, 2017Updated 8 years ago
- Lonely x64 binary to Bypass Win10 UAC utilizing ALPC method with [command line]☆32Jun 30, 2023Updated 2 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Nov 30, 2025Updated 4 months ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- CVE-2021-22205 RCE☆13Jul 4, 2022Updated 3 years ago
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- Code 4rena Sandbox & Exploits☆14Mar 1, 2022Updated 4 years ago
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A tool to attack ARP☆15May 27, 2021Updated 4 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Jun 5, 2023Updated 2 years ago
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentests☆15Feb 27, 2021Updated 5 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 5 years ago
- repository containing some nmap scripts☆16Jan 15, 2021Updated 5 years ago