0xe7 / EventSniper
☆21Updated last year
Alternatives and similar repositories for EventSniper:
Users that are interested in EventSniper are comparing it to the libraries listed below
- Example of using Sleep to create better named pipes.☆41Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- ☆18Updated 4 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 2 months ago
- Dump Teams conversations☆19Updated 3 years ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 2 weeks ago
- Scripts to interact with Microsoft Graph APIs☆36Updated 6 months ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated last year
- ☆43Updated last year
- ☆25Updated 3 years ago
- ☆21Updated 2 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆14Updated last month
- A VSCode plugin to assist with BOF development.☆36Updated 8 months ago
- ☆36Updated 11 months ago
- ☆25Updated 2 years ago
- Some of my custom "tools".☆23Updated 3 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆14Updated last year
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago
- Some stuff for PHD2021☆14Updated 3 years ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆38Updated 2 months ago
- ☆28Updated 9 months ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆21Updated last year
- All my POC related to malware development☆11Updated 11 months ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆26Updated 3 months ago
- ☆29Updated 2 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆21Updated 3 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago