0xf4r / cmd-bypassLinks
The command prompt has been disabled by your administrator
☆42Updated 2 years ago
Alternatives and similar repositories for cmd-bypass
Users that are interested in cmd-bypass are comparing it to the libraries listed below
Sorting:
- Tool to aid in dumping LSASS process remotely☆42Updated 4 months ago
- DFSCoerce exe revisited version with custom authentication☆42Updated 2 years ago
- Python tool to interact with WMI StdRegProv☆60Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆28Updated last year
- Validates priv escalation of AD trusts☆48Updated 10 months ago
- SAM Dumping in C#☆54Updated 2 months ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Updated last week
- Exhaustive search and flexible filtering of Active Directory ACEs.☆73Updated 3 months ago
- Extract registry and NTDS secrets from local or remote disk images☆45Updated 10 months ago
- A C# tool for extracting information from SCCM PXE boot media.☆45Updated 3 weeks ago
- ☆59Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆61Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.☆33Updated 2 years ago
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆132Updated 5 months ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Updated 11 months ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆56Updated 2 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Updated last year
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆45Updated last year
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Updated last year
- Docker container for running CobaltStrike 4.10☆38Updated last year
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Updated 5 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Updated last year
- ☆40Updated last year
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆41Updated 2 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆25Updated last month
- Proof of Concept Exploit for CVE-2024-9465☆30Updated last year
- Dump processes over WMI with MSFT_MTProcess☆81Updated 4 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆77Updated last year
- ☆47Updated 2 months ago
- ☆38Updated 11 months ago