xforcered / DendrobateLinks
Managed code hooking template.
☆108Updated 4 years ago
Alternatives and similar repositories for Dendrobate
Users that are interested in Dendrobate are comparing it to the libraries listed below
Sorting:
- Code Exec via Excel☆87Updated 8 years ago
- D/Invoke port of UrbanBishop☆108Updated 5 years ago
- ☆9Updated 4 years ago
- ☆112Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Updated 4 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 3 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆121Updated 4 years ago
- Collection of VBA macro published in our twitter / blog☆158Updated 2 years ago
- ☆127Updated 5 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 4 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Updated 5 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 4 years ago
- ☆95Updated 3 years ago
- ☆108Updated 3 years ago
- Dll that can be used for side loading and other attack vector.☆202Updated 4 years ago
- ☆163Updated 2 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- Quick and dirty dynamic redirect.rules generator☆164Updated 2 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 4 years ago
- Dump stuff without touching disk☆164Updated 4 years ago
- This repo is dedicated to a powerpoint exploit☆34Updated 4 years ago
- Tradecraft Development Fundamentals☆40Updated 4 years ago
- Managed code hooking template.☆132Updated 3 years ago
- ☆48Updated 5 years ago
- Exchangelib wrapper for pentesting☆64Updated 5 months ago
- Iterative AD discovery toolkit for offensive operations☆87Updated 5 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago