Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for c sharp exploitation
c-sharp
x
exploitation
x
17 search results found
Silenttrinity
⭐
2,087
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Poshc2
⭐
1,645
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
Security List
⭐
1,181
If you have any good suggestions or comments during the search process, please feedback some index experience in issues. Thank you for your participation.查阅过程中,如果有什么好的意见或建议,请在Issues反馈,感谢您的参与
Pentest Tools
⭐
1,095
Potato
⭐
460
Exploitremotingservice
⭐
454
A tool to exploit .NET Remoting Services
Proxy Attackchain
⭐
438
Proxylogon & Proxyshell & Proxyoracle & Proxytoken & All exchange server history vulns summarization :)
Random Csharptools
⭐
208
Collection of CSharp Assemblies focused on Post-Exploitation Capabilities
Erc.xdbg
⭐
121
An Xdbg Plugin of the ERC Library.
Hikpasswordhelper
⭐
100
A tool which exploits a backdoor in Hikvision camera firmwares circa 2014-2016 to help the owner change a forgotten password.
Banditdungeon
⭐
89
Demo project using multi-armed bandit algorithm
Animesoftware
⭐
79
C# External griefing cheat for Counter-Strike: Global Offensive.
Evasor
⭐
76
A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
Uac_exploit
⭐
71
Escalate as Administrator bypassing the UAC affecting administrator accounts only.
Cve 2020 3153
⭐
69
Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal
Cve 2020 17144
⭐
58
weaponized tool for CVE-2020-17144
Xploit
⭐
54
Open source exploit framework made in C#
Icememe
⭐
48
Roblox Exploit Source Code Called IceMeme with some cmds, lua c and limited lua execution with simple ui in c#
Ps4 Payload Injector Tool
⭐
47
Potato
⭐
43
Windows privilege escalation through NTLM Relay and NBNS Spoofing
Apsoft Web Scanner V2
⭐
43
Powerful dork searcher and vulnerability scanner for windows platform
Privescker
⭐
37
Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in one go.
Coresploit
⭐
35
Initial Commit of Coresploit
Smallp0wnedshell
⭐
33
Small modification version of p0wnedShell
Irisrobloxmultitool
⭐
30
Multi Tool | We Are Devs Keygen | Krnl Keygen
Sql Nightmare
⭐
26
SQL SERVER Exploitation.
Exploit Template With Wrdapi
⭐
26
Quickstart for creating a Roblox exploit with the WeAreDevs API
Dvrat
⭐
25
. مشروع يهدف لصنع برمجية خبيثة متكاملة
Cve 2018 20250 Winrar Ace
⭐
21
Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).
Lightcosmosrat
⭐
21
A remote administration tool for Windows, written in C#
Erc.xdbg
⭐
17
An Xdbg Plugin of the ERC Library.
Xsymlink
⭐
16
Xbox One Symbolic Link Exploit: Access restricted/encrypted volumes using the Xbox File Explorer.
Slient Url Exploit Slient Builder Exploit Database Cve 2023 Malware
⭐
16
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Seringa
⭐
14
Seringa - SQL Injection framework
Eaprimer
⭐
14
C# project to Reflectively load .Net assemblies in memory
Fallguyssharp
⭐
13
FallGuys cheats, hacks, exploits
Ctf 2017
⭐
11
BSidesPDX CTF 2017
Advanced Sql Injection Scanner
⭐
11
Ivan Ricart Borges - Test for didactic purposes of web pages vulnerables to SQL injection using dbo database user with xp_cmdshell execution permissions. Using patterns from Internet search engines to extract potentially vulnerable web addresses and test them by changing the GET parameters using invalid Transact-SQL conversion function to cause through unhandled errors by IIS web server to show critical information. If certain features are given and using advanced injection techniques a maliciou
Uac Bypass Fud
⭐
10
The UAC Bypass program is designed to run files with elevated privileges on Windows without requesting user permission or displaying the UAC screen. It provides a way to bypass User Account Control (UAC) restrictions for specific tasks.
Exsim
⭐
9
Abstract memory safety exploitation simulator
Starbound Drawablesgenerator
⭐
9
Converts images to drawables for Starbound
Owdemo
⭐
9
A tool for Counter-Strike: Global Offensive which allows you to find the unencrypted demo of your Overwatch case.
Sharpbyebear
⭐
8
AppXSVC Service race condition - privilege escalation
Sharprat
⭐
8
A Basic Proof Of Concept Remote Administration Tool Written In C# With Functioning Exploits
Zugabe
⭐
8
A tool for automating TheFlow's h-encore vita exploit
Canape Ssl Mitm Osx
⭐
8
A simple CANAPE extension to exploit iOS/OSX SSL vulnerability
Discorddatagrabber
⭐
7
🔧 The program that allows you to grab certain info about the victim
Neoblox
⭐
7
A level 7 keyless Lua executor for Roblox. Free, forever!
Cve 2017 8759
⭐
7
Simple C# implementation of CVE-2017-8759
Locksmith
⭐
6
Locksmith is a tool which allow simple way to test several API keys for a bug bounty program
R3xploit
⭐
6
Exploit for Hacking Roblox, Support multiples Api
Solarputtydecrypt
⭐
6
A post-exploitation tool to decrypt SolarPutty's sessions files
Fluxapi
⭐
6
FluxAPI, simple exploit API.
Http Blackops
⭐
6
BlackOps is a web debugging proxy tool
Upsploit
⭐
6
File Upload Vulnerability Identification and Exploitation Tool
Recon2016
⭐
5
BBS-Era Exploitation for Fun and Anachronism
Recsys
⭐
5
Implementations of RecSys algorithms described in research papers including mine.
Safedeserializationhelpers
⭐
5
👹 Fixes known BinaryFormatter deserialization vulnerabilities
Related Searches
C Sharp Unity (13,521)
C Sharp Video Game (8,498)
C Sharp Azure (4,292)
C Sharp Unity3d (4,236)
C Sharp Wpf (3,118)
C Sharp Visual Studio (2,839)
C Sharp Command Line (2,702)
C Sharp Asp Net Core (2,668)
C Sharp Sql (2,429)
C Sharp Microsoft (2,368)
1-17 of 17 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.