0xf4r / cmd-bypassLinks
The command prompt has been disabled by your administrator
☆41Updated 2 years ago
Alternatives and similar repositories for cmd-bypass
Users that are interested in cmd-bypass are comparing it to the libraries listed below
Sorting:
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- Tool to aid in dumping LSASS process remotely☆41Updated 2 weeks ago
- Remotely dump NT hashes through Windows Crash dumps☆36Updated 11 months ago
- Python tool to interact with WMI StdRegProv☆60Updated 10 months ago
- SAM Dumping in C#☆52Updated 8 months ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆23Updated last year
- ☆44Updated 2 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆37Updated 5 months ago
- ☆58Updated 11 months ago
- ☆34Updated 7 months ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆43Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆42Updated last year
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆75Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆59Updated 2 months ago
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆33Updated last month
- ☆53Updated 2 weeks ago
- ☆42Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆27Updated 8 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆47Updated 7 months ago
- Docker container for running CobaltStrike 4.10☆37Updated last year
- ☆44Updated 2 weeks ago
- Validates priv escalation of AD trusts☆47Updated 6 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆58Updated 9 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆87Updated last year
- ☆29Updated last year
- ☆82Updated last year
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆40Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆54Updated 3 months ago