RPC to WebClient startup
☆57Aug 19, 2025Updated 7 months ago
Alternatives and similar repositories for rpc2wc
Users that are interested in rpc2wc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Lateral Movement Bof with MSI ODBC Driver Install☆148Sep 30, 2025Updated 5 months ago
- SCEP request tool for AD CS and Intune☆74Oct 24, 2025Updated 5 months ago
- Internal Monologue BOF☆79Dec 28, 2024Updated last year
- ☆38Jan 7, 2025Updated last year
- A BOF to enumerate system process, their protection levels, and more.☆125Nov 27, 2024Updated last year
- Lateral movement with DCOM DLL hijacking☆176Jul 4, 2025Updated 8 months ago
- Python module for running BOFs☆80Nov 28, 2025Updated 3 months ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆326Oct 20, 2025Updated 5 months ago
- ☆53Jun 28, 2025Updated 8 months ago
- SharpExShell automates the DCOM lateral movment technique which abuses ActivateMicrosoftApp method of Excel application.☆75May 1, 2024Updated last year
- a BOF implementation of various registry persistence methods☆96Nov 11, 2025Updated 4 months ago
- List the ETW provider(s) in the registration table of a process.☆80Sep 20, 2023Updated 2 years ago
- Two tools written in C that block network traffic for blacklisted EDR processes, using either Windows Defender Firewall (WDF) or Windows …☆264Sep 23, 2025Updated 6 months ago
- A Python POC for CRED1 over SOCKS5☆165Oct 5, 2024Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆201Nov 4, 2025Updated 4 months ago
- ☆164May 5, 2025Updated 10 months ago
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD☆28Jan 4, 2024Updated 2 years ago
- ☆121Nov 21, 2024Updated last year
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 4 months ago
- Local SYSTEM auth trigger for relaying☆170Jul 22, 2025Updated 8 months ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- Commandline spoofing on Windows☆95Nov 25, 2025Updated 3 months ago
- Rainbow table generation & lookup tools.☆34Dec 17, 2025Updated 3 months ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆358Mar 17, 2026Updated last week
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 8 months ago
- ☆65Mar 15, 2024Updated 2 years ago
- An App Domain Manager Injection DLL PoC on steroids☆212Dec 14, 2023Updated 2 years ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆29Jun 9, 2025Updated 9 months ago
- "Service-less" driver loading☆184Nov 28, 2024Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆139Aug 25, 2025Updated 7 months ago
- ☆158Dec 13, 2024Updated last year
- adws enumeration bof☆169Feb 16, 2026Updated last month
- Enumerate Domain Users Without Authentication☆282Apr 22, 2025Updated 11 months ago
- ☆32Jun 1, 2024Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 7 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆272Jun 18, 2025Updated 9 months ago