AlmondOffSec / DCOMRunAsLinks
Lateral movement with DCOM DLL hijacking
☆40Updated this week
Alternatives and similar repositories for DCOMRunAs
Users that are interested in DCOMRunAs are comparing it to the libraries listed below
Sorting:
- SAM Dumping in C#☆48Updated 5 months ago
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- bring your own clean ntdll (or other MS dlls)☆22Updated this week
- ☆35Updated last week
- in-process powershell runner for BRC4☆45Updated last year
- Proxy function calls through the thread pool with ease☆28Updated 4 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆32Updated 2 months ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆40Updated 9 months ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆28Updated 2 months ago
- BOF for C2 framework☆41Updated 7 months ago
- Rewrite to fit my needs☆28Updated 11 months ago
- ☆48Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆50Updated 5 months ago
- ☆48Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 4 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆52Updated 2 months ago
- Scripts to interact with Microsoft Graph APIs☆42Updated 7 months ago
- Parser and reconciliation tooling for large Active Directory environments.☆33Updated 4 months ago
- ☆56Updated 4 months ago
- ☆17Updated 2 weeks ago
- Click Once + App Domain☆62Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- ☆50Updated 3 weeks ago
- Tool to obtain hash using MS-SNTP for user accounts☆24Updated 5 months ago
- Post-Ex BOF tooling for Hannibal☆22Updated 7 months ago
- ☆29Updated last year
- ☆52Updated 6 months ago
- ☆28Updated 11 months ago