tdubs / credential-provider
Custom Credential Provider to Log credentials on Windows 7 and higher
☆16Updated 6 years ago
Alternatives and similar repositories for credential-provider:
Users that are interested in credential-provider are comparing it to the libraries listed below
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- ☆41Updated 5 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 4 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆30Updated 5 years ago
- Persistent through COM Hijacking☆20Updated 6 years ago
- ☆15Updated 4 years ago
- ☆33Updated 5 years ago
- ☆17Updated 5 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 4 years ago
- Files for http://deniable.org/windows/windows-callbacks☆24Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Experiments on the Windows Internals☆30Updated 5 years ago
- Mimikatz built as a static library.☆11Updated 3 years ago
- Synaptics Audio Driver LPE☆37Updated 5 years ago
- ☆25Updated 6 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Updated 4 years ago
- A reduced functionality cli client for the imdisk ram disk driver. To be used through a backdoor like meterpreter☆22Updated 6 years ago
- ☆24Updated 3 years ago
- PoC for CVE-2020-1015☆40Updated 4 years ago
- ☆14Updated 4 years ago
- C# DCOM Execution☆18Updated 5 years ago
- Run Managed Assemblies with RunDll☆17Updated 6 years ago
- C# code to run PIC using CreateThread☆16Updated 5 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- ☆18Updated 3 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Updated 3 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆38Updated 4 years ago
- ☆31Updated 4 years ago
- ☆54Updated 6 years ago