CICADA8-Research / LogHunterLinks
Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)
☆71Updated last year
Alternatives and similar repositories for LogHunter
Users that are interested in LogHunter are comparing it to the libraries listed below
Sorting:
- ☆56Updated 4 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- Inject RDPThief into memory with PowerShell.☆64Updated 5 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- ☆186Updated 3 months ago
- ☆107Updated 4 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆92Updated 2 months ago
- Automated .NET AppDomain hijack payload generation☆126Updated 5 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆122Updated 9 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆38Updated 5 months ago
- ☆140Updated 2 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆51Updated this week
- Pre-Auth Exploit for CVE-2024-40711☆50Updated 9 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 3 months ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆77Updated 4 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated 10 months ago
- ☆90Updated last year
- TokenCert☆98Updated 8 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 5 months ago
- ☆132Updated 5 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆118Updated 3 months ago
- Lateral Movement☆124Updated last year
- Tool to extract username and password of current user from PanGPA in plaintext☆85Updated 6 months ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Active Directory Authentication Library☆77Updated last week
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- PowerShell script to generate ShellCode in various formats☆41Updated 9 months ago
- Abuse leaked token handles.☆132Updated last year
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year