tothi / malicious-service
Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions
☆13Updated 2 years ago
Alternatives and similar repositories for malicious-service:
Users that are interested in malicious-service are comparing it to the libraries listed below
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Scripts to interact with Microsoft Graph APIs☆33Updated 3 months ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆19Updated last year
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- ☆16Updated 4 months ago
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆47Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 8 months ago
- Dumping LSA secrets: a story about task decorrelation☆14Updated 7 months ago
- ☆17Updated last month
- Extension functionality for the NightHawk operator client☆26Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Bunch of BOF files☆27Updated last month
- Example of using Sleep to create better named pipes.☆41Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- load dumped csharp binaries as assemblies and launch them in memory☆26Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 8 months ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 4 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 7 months ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 7 months ago
- in-process powershell runner for BRC4☆44Updated last year
- ☆46Updated 2 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆18Updated last year
- All my POC related to malware development☆11Updated 9 months ago
- Enumerate the Domain for Readable and Writable Shares☆16Updated 8 months ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆37Updated last year
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆36Updated last year