0xe7 / EventSniperLinks
☆20Updated 2 years ago
Alternatives and similar repositories for EventSniper
Users that are interested in EventSniper are comparing it to the libraries listed below
Sorting:
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆34Updated 2 years ago
- Example of using Sleep to create better named pipes.☆41Updated 2 years ago
- ☆25Updated 3 years ago
- ☆36Updated last year
- Click Once + App Domain☆64Updated last year
- A VSCode devcontainer for development of COFF files with batteries included.☆50Updated 2 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆34Updated last year
- ☆43Updated 2 years ago
- ☆49Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 5 years ago
- C# version of NTLMRawUnHide☆72Updated 3 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆23Updated last year
- ☆28Updated last year
- ☆39Updated 3 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Updated 3 months ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 3 years ago
- .NET port of Leron Gray's azbelt tool.☆26Updated 2 years ago
- Dump Teams conversations☆19Updated 4 years ago
- ☆36Updated 9 months ago
- Some of my custom "tools".☆29Updated 3 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12Updated 6 months ago
- A care package of useful bofs for red team engagments☆55Updated 11 months ago
- ☆60Updated 4 years ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- WhoAmI by asking the LDAP service on a domain controller.☆64Updated 3 years ago
- Beacon Object Files (not Buffer Overflows)☆56Updated 2 years ago
- ☆23Updated last year
- A technique for Active Directory domain persistence☆39Updated 2 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 3 years ago