tommelo / lnk2pwnLinks
Malicious Shortcut(.lnk) Generator
☆86Updated 6 years ago
Alternatives and similar repositories for lnk2pwn
Users that are interested in lnk2pwn are comparing it to the libraries listed below
Sorting:
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 4 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆90Updated 5 years ago
- Weaponizing for privileged file writes bugs with PrintNotify Service☆133Updated 3 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆38Updated 2 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 3 years ago
- Dump stuff without touching disk☆164Updated 5 years ago
- C# tool to discover low hanging fruits☆95Updated 2 years ago
- Extendable payload obfuscation and delivery framework☆145Updated 2 years ago
- Simple APPLocker bypass summary☆45Updated 7 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Automating payload generation for OSEP labs and exam.☆34Updated 3 years ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆67Updated 5 years ago
- PrintNightmare (CVE-2021-34527) PoC Exploit☆116Updated 2 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆131Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated 2 years ago
- A fake AMSI Provider which can be used for persistence.☆152Updated 4 years ago
- Malicious Shortcut(.lnk) Generator☆198Updated 6 years ago
- Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in…☆104Updated 3 years ago
- Simple rapper for Mimikatz, bypass Defender☆137Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆102Updated 2 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆187Updated 2 months ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 4 years ago
- python spraying tools based on impacket lib☆54Updated 3 years ago
- A sort of simple shell which support multiple protocols.☆99Updated 6 years ago
- Bypassing AppLocker with C#☆143Updated 4 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆197Updated 2 months ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Updated last year
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- ☆129Updated 2 years ago
- Simple reverse shell to avoid Win 11 defender detection☆122Updated 3 years ago