-
FOG
- Classified - Stringent
- https://orcid.org/0009-0005-2511-8499
- @BartBlack15
Lists (1)
Sort Name ascending (A-Z)
- All languages
- ASP
- ASP.NET
- Adblock Filter List
- Assembly
- AutoHotkey
- AutoIt
- Awk
- Batchfile
- Boo
- C
- C#
- C++
- CSS
- Crystal
- Dart
- Dockerfile
- Gnuplot
- Go
- HTML
- Haskell
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- Makefile
- Markdown
- Nim
- Nix
- Objective-C
- PHP
- Pascal
- Perl
- PostScript
- PowerShell
- Python
- R
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- Swift
- SystemVerilog
- TSQL
- TypeScript
- VBA
- VBScript
- Visual Basic
- Vue
- XSLT
- YAML
- YARA
Starred repositories
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Downloads videos and playlists from YouTube
A wrapper executable that can run any executable as a Windows service, in a permissive license.
A toolkit for developing high-performance HTTP reverse proxy applications.
Deserialization payload generator for a variety of .NET formatters
Tool to find metadata and hidden information in the documents.
Open source obfuscation tool for .NET assemblies
.NET IPv4/IPv6 machine-in-the-middle tool for penetration testers
Open-Source Remote Administration Tool For Windows C# (RAT)
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
SharpSploit is a .NET post-exploitation library written in C#
Run PowerShell with rundll32. Bypass software restrictions.
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
Windows update managemetn tool for windows 10
Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources
Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system management. Has features such as HVNC, live microphone, reverse prox…
RunasCs - Csharp and open version of windows builtin runas.exe
SharpGPOAbuse is a .NET application written in C# that can be used to take advantage of a user's edit rights on a Group Policy Object (GPO) in order to compromise the objects that are controlled by…
This program is designed to demonstrate various process injection techniques
Writing custom backdoor payloads with C# - Defcon 27 Workshop
Windows tail program and log file analyzer.