xforcered / DendrobateLinks
Managed code hooking template.
☆108Updated 4 years ago
Alternatives and similar repositories for Dendrobate
Users that are interested in Dendrobate are comparing it to the libraries listed below
Sorting:
- Proper Payload Protection Prevents Poor Performance☆74Updated 3 years ago
- Code Exec via Excel☆88Updated 8 years ago
- ☆10Updated 4 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆123Updated 4 years ago
- ☆112Updated 2 years ago
- Collection of VBA macro published in our twitter / blog☆159Updated 3 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Updated 4 years ago
- D/Invoke port of UrbanBishop☆108Updated 5 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 4 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Updated 5 years ago
- BH Cypher Queries picked up from random places☆39Updated 6 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- ☆97Updated 3 years ago
- Dll that can be used for side loading and other attack vector.☆202Updated 5 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 4 years ago
- This repo is dedicated to a powerpoint exploit☆34Updated 4 years ago
- ☆108Updated 4 years ago
- ☆48Updated 5 years ago
- Exchangelib wrapper for pentesting☆67Updated 8 months ago
- ☆127Updated 5 years ago
- Python3 tool to perform password spraying against Microsoft Online service using various methods☆86Updated 2 years ago
- Quick and dirty dynamic redirect.rules generator☆166Updated 3 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- ☆167Updated 2 years ago
- An Ansible role for installing Cobalt Strike.☆81Updated 2 weeks ago
- Sustainable shellcode evasion☆112Updated 10 months ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 4 years ago
- Tradecraft Development Fundamentals☆40Updated 4 years ago