wishihab / JarProtectorLinks
Jar Protector - Jar Crypter
☆14Updated 7 years ago
Alternatives and similar repositories for JarProtector
Users that are interested in JarProtector are comparing it to the libraries listed below
Sorting:
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 5 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 7 years ago
- Windows 10 Exploit☆30Updated 6 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- ☆45Updated 7 years ago
- ☆54Updated 7 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Updated 5 years ago
- My Shellcode Archive☆29Updated 8 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Updated 3 years ago
- ☆17Updated 7 years ago
- C# Situational Awareness Script☆34Updated 6 years ago
- interesting analysis☆16Updated 7 years ago
- Monitor the textual data pasted into Windows clipboard☆29Updated 6 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- ☆14Updated 6 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 8 years ago
- Telegram-based PowerShell Runspace Host☆11Updated 2 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 4 years ago
- CVE-2020-5837 exploit☆43Updated 5 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆44Updated 4 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Updated 5 years ago
- Playing around with token manipulation in C#.☆29Updated 5 years ago
- Simple C# reverse shell with shellcode and process injection☆39Updated 9 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- ☆13Updated 5 years ago
- ☆33Updated 10 years ago