ChoiSG / SharpSilentChromeLinks
SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Preferences and Secure Preferences files. Currently, it only supports Windows.
☆171Updated 3 weeks ago
Alternatives and similar repositories for SharpSilentChrome
Users that are interested in SharpSilentChrome are comparing it to the libraries listed below
Sorting:
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆99Updated 2 months ago
- Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellco…☆41Updated 10 months ago
- Silently Install Chrome Extension For Persistence☆92Updated last year
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆58Updated 6 months ago
- Help red teams find opsec processes during engagements☆42Updated 8 months ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆206Updated 2 years ago
- ☆57Updated last year
- ☆81Updated last year
- Test bench lab for Shellcode Obfuscation☆28Updated 3 months ago
- Evasive loader to bypass static detection☆58Updated last year
- ☆142Updated 2 years ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆54Updated last year
- A Simple PoC☆21Updated last year
- Golang implementation of @CCob's C# ThreadlessInject☆31Updated last year
- Generator of https://github.com/TheWover/donut in pure Go. supports compression, AMSI/WLDP/ETW bypass, etc.☆59Updated 2 years ago
- ☆158Updated 2 years ago
- ApexLdr is a DLL Payload Loader written in C☆112Updated last year
- Homemade Aggressor scripts kit for Cobalt Strike☆74Updated last month
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆225Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆246Updated last year
- ☆48Updated 3 months ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆140Updated 4 years ago
- Little program written in C# to bypass EDR hooks and dump the content of the lsass process☆62Updated 4 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆53Updated 2 years ago
- Cobalt Strike Beacon Object File for bypassing UAC via the CMSTPLUA COM interface.☆197Updated 2 years ago
- CVE-2024-40711-exp☆42Updated 10 months ago
- Execute commands in other Sessions☆90Updated last year
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆127Updated last month
- Beacon Object File (BOF) Template☆55Updated 9 months ago
- Cobalt Strike + Brute Ratel C4 Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique☆157Updated last year