CIMplant
WMI-Tutorial
Our great sponsors
CIMplant | WMI-Tutorial | |
---|---|---|
1 | 1 | |
194 | 0 | |
0.0% | - | |
0.0 | 0.0 | |
almost 3 years ago | over 1 year ago | |
C# | C# | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
CIMplant
WMI-Tutorial
What are some alternatives?
ImpulsiveDLLHijack - C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
AntiCrack-DotNet - C# Project contains a plenty of Advanced Anti-Debugging, Anti-Virtualization, Anti Dll-Injection and Anti-Hooking Techniques.
LocalAdminSharp - .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access
ORMi - A Light-ORM for accesing WMI
defcon27_csharp_workshop - Writing custom backdoor payloads with C# - Defcon 27 Workshop
Kexla - A simple and light WMI that do all the hard work for you
SharpStrike - A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.
Csharp-Data-Visualization - Resources for visualizing data using C# and the .NET platform
XenServer - XenCenter, the Windows management console for XenServer