xforcered / DendrobateLinks
Managed code hooking template.
☆108Updated 4 years ago
Alternatives and similar repositories for Dendrobate
Users that are interested in Dendrobate are comparing it to the libraries listed below
Sorting:
- Code Exec via Excel☆87Updated 7 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago
- D/Invoke port of UrbanBishop☆107Updated 4 years ago
- ☆9Updated 3 years ago
- (kinda) Malicious Outlook Reader☆135Updated 4 years ago
- ☆162Updated 2 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆90Updated 5 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- ☆48Updated 5 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆121Updated 4 years ago
- ☆112Updated last year
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 4 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago
- ☆95Updated 2 years ago
- ☆72Updated 3 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆85Updated 5 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆49Updated 4 years ago
- Simple APPLocker bypass summary☆42Updated 6 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆124Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 2 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆147Updated 4 years ago
- Dump stuff without touching disk☆163Updated 4 years ago
- AMSI Bypass Via the Heap☆107Updated 4 years ago
- Iterative AD discovery toolkit for offensive operations☆87Updated 5 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!