xforcered / DendrobateLinks
Managed code hooking template.
☆108Updated 4 years ago
Alternatives and similar repositories for Dendrobate
Users that are interested in Dendrobate are comparing it to the libraries listed below
Sorting:
- Code Exec via Excel☆87Updated 7 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- D/Invoke port of UrbanBishop☆107Updated 4 years ago
- ☆162Updated 2 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Updated 5 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆121Updated 4 years ago
- ☆9Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 4 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆147Updated 4 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆85Updated 5 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆87Updated 2 years ago
- AMSI Bypass Via the Heap☆107Updated 4 years ago
- Sustainable shellcode evasion☆109Updated 6 months ago
- Powershell module to get the NetNTLMv2 hash of the current user☆94Updated 2 years ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆64Updated 5 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- Targeted Payload Execution☆100Updated 5 years ago
- Smart Card PIN swiping DLL☆78Updated 4 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- ☆126Updated 5 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆124Updated 4 years ago
- Dll that can be used for side loading and other attack vector.☆201Updated 4 years ago
- lateral movement techniques that can be used during red team exercises☆273Updated 5 years ago