A simple toolkit on extracting RSA Software Tokens from RSA SecureID
☆42May 6, 2020Updated 5 years ago
Alternatives and similar repositories for RsaTokenExtractor
Users that are interested in RsaTokenExtractor are comparing it to the libraries listed below
Sorting:
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- Event Data Collector☆39Jan 12, 2026Updated last month
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- Antivirus Emulator Fingerprints☆30Oct 12, 2018Updated 7 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- ☆37May 9, 2019Updated 6 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- ObscurityLabs RedTeam C# Toolkit☆123Sep 3, 2019Updated 6 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Quick and dirty .net console app for querying mssql servers.☆24Aug 30, 2018Updated 7 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- Evading WinDefender ATP credential-theft☆255Dec 2, 2019Updated 6 years ago
- ☆54Apr 27, 2019Updated 6 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- ☆57May 13, 2020Updated 5 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆179Oct 21, 2018Updated 7 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- Use NtSetInformationThread(ThreadBreakOnTermination) for anti-debugging☆15Sep 21, 2019Updated 6 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Switch to JuicyPotato! https://github.com/decoder-it/juicy-potato☆12Feb 8, 2020Updated 6 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Print Spooler Named Pipe Impersonation for Cobalt Strike☆271Jun 13, 2020Updated 5 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- SharpSpray a simple code set to perform a password spraying attack against all users of a domain using LDAP and is compatible with Cobalt…☆195Jun 30, 2019Updated 6 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- Loads .NET Assembly Via CLR Loader☆17Mar 6, 2019Updated 6 years ago
- C# remote process injection utility for Cobalt Strike☆88Mar 9, 2020Updated 5 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago