Cobalt-Strike / ElevateKitLinks
The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.
☆123Updated 5 years ago
Alternatives and similar repositories for ElevateKit
Users that are interested in ElevateKit are comparing it to the libraries listed below
Sorting:
- Inject remote template link into word document for remote template injection☆180Updated 4 years ago
- Identifies the bytes that Microsoft Defender flags on.☆89Updated 3 years ago
- ☆163Updated 9 months ago
- ☆148Updated 4 months ago
- Payload Generation Framework☆94Updated last year
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆357Updated last year
- Custom Queries - Brought Up to BH4.1 syntax☆257Updated 3 months ago
- A Python based ingestor for BloodHound☆85Updated 2 years ago
- Cortex XDR Config Extractor☆133Updated 2 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆236Updated last year
- ☆88Updated 5 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆203Updated 3 months ago
- ☆34Updated 3 years ago
- ☆155Updated 6 months ago
- Buggy script to play with GPOs☆115Updated 7 months ago
- Roast in the Middle☆292Updated 9 months ago
- PowerShell Constrained Language Mode Bypass☆276Updated 4 years ago
- Malware As A Service☆135Updated last year
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆253Updated 4 months ago
- ☆68Updated 6 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆177Updated 2 years ago
- A collection of code snippets built to assist with breaking chains.☆123Updated last year
- Shellcode generation and encoding utility☆23Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆292Updated last month
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆117Updated 2 years ago
- ADCS abuser☆299Updated 2 years ago
- AV EVASION TECHNIQUES☆79Updated 3 years ago
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆169Updated last week
- A variety of AV evasion techniques written in C# for practice.☆95Updated 4 years ago
- ☆232Updated 2 years ago