☆87Nov 18, 2022Updated 3 years ago
Alternatives and similar repositories for WonkaVision
Users that are interested in WonkaVision are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- Basic implementation of Cobalt Strikes - User Defined Reflective Loader feature☆101Feb 28, 2023Updated 3 years ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆69Aug 4, 2025Updated 7 months ago
- A C# tool to output crackable DPAPI hashes from user MasterKeys☆140Sep 14, 2024Updated last year
- Beacon Object File implementation of Yaxser's Backstab☆15Mar 9, 2022Updated 4 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Serverless Redirector in various cloud vendor for red team☆73Dec 8, 2022Updated 3 years ago
- OPSEC safe Kerberoasting in C#☆198Jun 14, 2022Updated 3 years ago
- ☆13Oct 21, 2023Updated 2 years ago
- ☆128Mar 1, 2023Updated 3 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆53Sep 19, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆740May 19, 2023Updated 2 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258May 10, 2023Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- The most average C2 ever (MACE)☆97Apr 9, 2022Updated 3 years ago
- ☆22Jun 21, 2022Updated 3 years ago
- ☆176Mar 27, 2023Updated 2 years ago
- Collection of tools to use with Azure Applications☆113Oct 13, 2023Updated 2 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- Beacon Object Files (not Buffer Overflows)☆58Mar 6, 2023Updated 3 years ago
- Collection of random RedTeam scripts.☆212Mar 8, 2024Updated 2 years ago
- C# Port of LdapRelayScan☆91Nov 26, 2025Updated 3 months ago
- A standalone DLL that exports databases in cleartext once injected in the KeePass process.☆300Mar 1, 2023Updated 3 years ago
- ☆107Jan 4, 2023Updated 3 years ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 3 years ago
- ☆382Jan 19, 2023Updated 3 years ago
- ☆224Oct 22, 2023Updated 2 years ago
- ☆88Jul 28, 2022Updated 3 years ago
- C or BOF file to extract WebKit master key to decrypt user cookie☆207Apr 29, 2024Updated last year
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61May 24, 2022Updated 3 years ago
- ☆32Sep 23, 2022Updated 3 years ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- Kerberoast Detection Script☆30Oct 31, 2024Updated last year
- Source Code Management Attack Toolkit☆225Sep 20, 2022Updated 3 years ago
- ☆48Feb 11, 2023Updated 3 years ago
- ☆181Dec 16, 2022Updated 3 years ago