ChoiSG / SharpSilentChromeLinks
SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Preferences and Secure Preferences files. Currently, it only supports Windows.
☆176Updated 2 months ago
Alternatives and similar repositories for SharpSilentChrome
Users that are interested in SharpSilentChrome are comparing it to the libraries listed below
Sorting:
- Silently Install Chrome Extension For Persistence☆93Updated last year
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆102Updated last week
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆59Updated 7 months ago
- Bypass YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellcode sequences.☆43Updated 2 weeks ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated 2 years ago
- ☆58Updated last year
- Help red teams find opsec processes during engagements☆43Updated 10 months ago
- Test bench lab for Shellcode Obfuscation☆29Updated last month
- ☆81Updated last year
- Evasive loader to bypass static detection☆59Updated last year
- PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆160Updated last month
- ☆142Updated 2 years ago
- Golang implementation of @CCob's C# ThreadlessInject☆31Updated last year
- A Simple PoC☆21Updated last year
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆53Updated last year
- Homemade Aggressor scripts kit for Cobalt Strike☆79Updated 2 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆225Updated last year
- Execute commands in other Sessions☆89Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆248Updated last year
- ☆49Updated 5 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆57Updated 2 years ago
- CVE-2024-40711-exp☆42Updated last year
- ☆159Updated 2 years ago
- ApexLdr is a DLL Payload Loader written in C☆113Updated last year
- A .NET Runtime for Cobalt Strike's Beacon Object Files☆84Updated last year
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆142Updated 4 years ago
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆201Updated 3 years ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆129Updated 2 months ago
- NSecSoftBYOVD POC☆46Updated last month