808ale / NetRunners
Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.
☆11Updated 11 months ago
Alternatives and similar repositories for NetRunners:
Users that are interested in NetRunners are comparing it to the libraries listed below
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆12Updated last year
- Dumping LSASS Evaded Endpoint Security Solutions☆11Updated last month
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆13Updated 2 years ago
- Enumerate the Domain for Readable and Writable Shares☆17Updated last month
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 10 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆24Updated 2 months ago
- Excel Add In Payload Generator☆10Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆12Updated 10 months ago
- Scripts to interact with Microsoft Graph APIs☆36Updated 4 months ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆18Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- A repo of scripts I find helpful for daily tasks.☆28Updated 10 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Brief writeup of post exploitation methodologies.☆18Updated last year
- ☆25Updated last week
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆18Updated last month
- A C# project that builds a Web Applciation which redirects all HTTPS☆24Updated last month
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated last year
- Items related to the RedELK workshop given at security conferences☆28Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆24Updated 2 months ago
- Impacket pre-compiled binaries☆15Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated last week
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆42Updated last month
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆11Updated this week
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆13Updated 2 years ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆31Updated last month
- Extra cmdlets to help with quering security related information from Azure☆13Updated 6 months ago