xforcered / Dendrobate
Managed code hooking template.
☆108Updated 4 years ago
Alternatives and similar repositories for Dendrobate
Users that are interested in Dendrobate are comparing it to the libraries listed below
Sorting:
- Code Exec via Excel☆87Updated 7 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆90Updated 5 years ago
- ☆162Updated 2 years ago
- ☆9Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- Proper Payload Protection Prevents Poor Performance☆73Updated 2 years ago
- Dump stuff without touching disk☆162Updated 4 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆85Updated 4 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆93Updated 2 years ago
- This code was used for the blogpost on secjuice.☆42Updated 6 years ago
- (kinda) Malicious Outlook Reader☆135Updated 4 years ago
- D/Invoke port of UrbanBishop☆107Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- Source for tasks I have used with Covenant☆120Updated 4 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆85Updated 5 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆124Updated 3 years ago
- Koppeling x Metatwin x LazySign☆210Updated 3 years ago
- ☆126Updated 4 years ago
- AMSI Bypass Via the Heap☆107Updated 4 years ago
- ☆112Updated last year
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆147Updated 4 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆242Updated 3 years ago
- Petaq - Purple Team Command & Control Server☆105Updated 2 years ago
- lateral movement techniques that can be used during red team exercises☆272Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- Iterative AD discovery toolkit for offensive operations☆87Updated 5 years ago
- ☆72Updated 3 years ago