Barriuso / SMBGhost_AutomateExploitationLinks
SMBGhost (CVE-2020-0796) Automate Exploitation and Detection
☆301Updated 3 years ago
Alternatives and similar repositories for SMBGhost_AutomateExploitation
Users that are interested in SMBGhost_AutomateExploitation are comparing it to the libraries listed below
Sorting:
- Various Cobalt Strike BOFs☆650Updated 2 years ago
- ☆521Updated 3 years ago
- Cobalt Strike script for ScareCrow payloads intergration (EDR/AV evasion)☆465Updated 2 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆542Updated 2 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,085Updated 2 years ago
- Exploit Code for CVE-2020-1472 aka Zerologon☆384Updated 4 years ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆226Updated 3 years ago
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆363Updated 4 years ago
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆363Updated this week
- Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. Built to evade EDR/UserLand hooks b…☆460Updated 2 years ago
- Cobalt Strike kit for Persistence☆475Updated 5 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆379Updated 2 years ago
- ☆205Updated 5 years ago
- Cobalt Strike kit for Lateral Movement☆668Updated 5 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆772Updated last year
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆277Updated 3 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆438Updated 2 years ago
- ☆293Updated 11 months ago
- [POC] Asynchronous reverse shell using the HTTP protocol.☆267Updated last week
- Assist reverse tcp shells in post-exploration tasks☆220Updated 2 weeks ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆454Updated last year
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆273Updated 3 years ago
- Bypass AMSI by patching AmsiScanBuffer☆265Updated 4 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆972Updated 2 years ago
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆1,002Updated 3 years ago
- Simple executable generator with encrypted shellcode.☆282Updated 2 years ago
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆222Updated 3 years ago
- ☆781Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,234Updated last year
- Exploit for the RpcEptMapper registry key permissions vulnerability (Windows 7 / 2088R2 / 8 / 2012)☆420Updated 4 years ago