Process Injection via Component Object Model (COM) IRundown::DoCallback()
Companion code to the following article:
https://www.mdsec.co.uk/2022/04/process-injection-via-component-object-model-com-irundowndocallback/
There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Companion code to the following article:
https://www.mdsec.co.uk/2022/04/process-injection-via-component-object-model-com-irundowndocallback/
SharpShooter
Payload Generation Frameworko365-attack-toolkit
A toolkit to attack Office365CACTUSTORCH
CACTUSTORCH: Payload Generation for Adversary SimulationsLinkedInt
LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulationChameleon
Chameleon: A tool for evading Proxy categorisationRDPInception
A proof of concept for the RDP Inception AttackFarmer
DragonCastle
A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.PowerDNS
PowerDNS: Powershell DNS DeliveryParallelSyscalls
SharpPack
An Insider Threat Toolkitfirewalker
sitrep
WMIPersistence
WMI Event Subscription Persistence in C#Browser-ExternalC2
External C2 Using IE COM ObjectsCloneVault
Execute-GithubAssembly-Aggressor
Aggressor Script to Execute Assemblies from GithubRegistryStrikesBack
lambda-webbugs
A proof of concept for delivering webbugs via AWS lambdaSharpAltiris
CVE-2018-4878
CVE-2023-26258-ArcServe
PleasantTools
Tools for Attacking Pleasant Password ServerTakeATest
Love Open Source and this site? Check out how you can help us