xforcered / Dendrobate
Managed code hooking template.
☆107Updated 4 years ago
Alternatives and similar repositories for Dendrobate:
Users that are interested in Dendrobate are comparing it to the libraries listed below
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- ☆9Updated 3 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- Code Exec via Excel☆86Updated 7 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆88Updated 5 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆145Updated 4 years ago
- ☆161Updated 2 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆121Updated 3 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆84Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆105Updated 2 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆122Updated 3 years ago
- ☆125Updated 4 years ago
- ☆92Updated 2 years ago
- AMSI Bypass Via the Heap☆105Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆70Updated 4 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 3 years ago
- Impacket Fork for Contributing and Sharing Our Knowledge about Windows☆64Updated 4 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆85Updated last year
- D/Invoke port of UrbanBishop☆106Updated 4 years ago
- Dump stuff without touching disk☆162Updated 4 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- Exchangelib wrapper for pentesting☆59Updated this week
- Material for the "Hands-On BloodHound" Workshop☆107Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆238Updated 3 years ago
- ☆108Updated 3 years ago
- (kinda) Malicious Outlook Reader☆133Updated 3 years ago
- Port of Invoke-Excel4DCOM☆103Updated 5 years ago
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆94Updated last year
- Dll that can be used for side loading and other attack vector.☆201Updated 4 years ago