yanncam / exe2powershell
exe2powershell - exe2bat reborn for modern Windows
☆165Updated 3 years ago
Related projects: ⓘ
- I created the python script to bypass UAC to get system shell .☆118Updated 5 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆263Updated 4 years ago
- Example DLL to load from Windows NetShell☆175Updated 7 years ago
- Windows UAC Bypass☆96Updated 5 years ago
- Binaries, PowerShell scripts and information about Digital Signature Hijacking.☆210Updated 6 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆169Updated 4 years ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆109Updated last year
- ☆347Updated 2 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆250Updated 5 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆113Updated 4 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆331Updated last year
- Use CLR to inject all the .NET apps☆183Updated 3 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆321Updated 5 years ago
- ☆184Updated 3 years ago
- Create a minidump of the LSASS process from memory☆254Updated last year
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆237Updated 4 years ago
- Discover Printers☆164Updated 5 years ago
- Lateral Movement technique using DCOM and HTA☆228Updated last year
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆323Updated 3 years ago
- ☆207Updated 5 years ago
- SharpClipHistory is a .NET application written in C# that can be used to read the contents of a user's clipboard history in Windows 10 st…☆188Updated 4 years ago
- Cobalt Strike Python API☆291Updated 2 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆221Updated 5 years ago
- Enumerate and decrypt TeamViewer credentials from Windows registry☆239Updated 2 years ago
- Run shellcode from resource☆250Updated 3 years ago
- Programmatically create an administrative user under Windows☆177Updated 7 years ago
- Windows Credentials Editor v1.3beta☆106Updated 5 years ago
- Various Aggressor Scripts I've Created.☆146Updated 2 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆324Updated 2 years ago
- Yet another PoC for https://www.wietzebeukema.nl/blog/hijacking-dlls-in-windows☆142Updated 4 years ago