Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)
☆78Jun 11, 2024Updated last year
Alternatives and similar repositories for LogHunter
Users that are interested in LogHunter are comparing it to the libraries listed below
Sorting:
- A simple BOF that frees UDRLs☆122May 29, 2022Updated 3 years ago
- Process injection alternative☆406Sep 6, 2024Updated last year
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- ☆100Sep 1, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆637May 8, 2025Updated 9 months ago
- Library of BOFs to interact with SQL servers☆223Dec 3, 2025Updated 3 months ago
- ☆92May 15, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- ☆123Oct 9, 2023Updated 2 years ago
- ☆109Feb 17, 2025Updated last year
- Lateral Movement via the .NET Profiler☆100Nov 21, 2024Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆250Jun 11, 2024Updated last year
- List/Read contents of Zip files (in memory and without extraction) using CobaltStrike's Execute-Assembly☆61May 24, 2022Updated 3 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆361Dec 13, 2025Updated 2 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆260Aug 13, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆53Sep 23, 2025Updated 5 months ago
- Porting of BOF InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.☆277Apr 17, 2023Updated 2 years ago
- A beacon object file implementation of PoolParty Process Injection Technique.☆434Dec 21, 2023Updated 2 years ago
- Hide your P/Invoke signatures through other people's signed assemblies☆211Mar 10, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆345Nov 19, 2024Updated last year
- Beacon Object File to locate and suspend the threads hosting the Event Log service☆29Jun 17, 2022Updated 3 years ago
- BypassCredGuard CS BOF☆49Jan 23, 2025Updated last year
- A simple PoC of injection shellcode into a remote process and get the output using namepipe☆44Jan 10, 2024Updated 2 years ago
- ☆144May 22, 2024Updated last year
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 2 months ago
- BOF implementation of delete self poc that delete a locked executable or a currently running file from disk by its pid, path, or the curr…☆78Jul 23, 2023Updated 2 years ago
- ☆126Sep 1, 2024Updated last year
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆675Aug 15, 2025Updated 6 months ago
- Open Source C&C Specification☆277Feb 28, 2025Updated last year
- ☆137Feb 11, 2025Updated last year
- Stage 0☆169Dec 18, 2024Updated last year
- Aggressor Notification Scripts for cobaltstrike via slack & discord☆14Nov 27, 2025Updated 3 months ago
- Simple POC library to execute arbitrary calls proxying them via NdrServerCall2 or similar☆137Aug 10, 2024Updated last year
- Lateral Movement Using DCOM and DLL Hijacking☆325Jun 18, 2023Updated 2 years ago
- ☆26Nov 8, 2024Updated last year