Cerbersec / pyMetaTwinLinks
Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform
☆16Updated last year
Alternatives and similar repositories for pyMetaTwin
Users that are interested in pyMetaTwin are comparing it to the libraries listed below
Sorting:
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- Cobalt Strike UDRL for memory scanner evasion.☆51Updated last year
- SAM Dumping in C#☆48Updated 4 months ago
- Beacon Object Files (not Buffer Overflows)☆55Updated 2 years ago
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆37Updated 8 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆20Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated last month
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆39Updated last year
- A VSCode plugin to assist with BOF development.☆36Updated 9 months ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆18Updated 2 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆21Updated 11 months ago
- BypassCredGuard CS BOF☆39Updated 4 months ago
- A .NET implementation to dump SAM, SYSTEM, SECURITY registry hives from a remote host☆39Updated last year
- Click Once + App Domain☆62Updated last year
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆27Updated 11 months ago
- ☆25Updated 3 years ago
- Modified versions of the Cobalt Strike Process Injection Kit☆94Updated last year
- ☆52Updated 5 months ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆25Updated 9 months ago
- Using LNK files and user input simulation to start processes under explorer.exe☆25Updated 8 months ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆53Updated 5 months ago
- ☆40Updated this week
- Beacon Object Files (BOF) for Cobalt Strike.☆31Updated 9 months ago
- ☆20Updated 11 months ago
- ☆27Updated 4 months ago
- ☆48Updated 2 years ago
- A care package of useful bofs for red team engagments☆55Updated 5 months ago
- ProcExp Driver (Ab)use☆22Updated 2 years ago