Cobaltlad / LSA_reg2PDF
Dumping LSA secrets: a story about task decorrelation
☆13Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for LSA_reg2PDF
- Python3 rewrite of AsOutsider features of AADInternals☆35Updated 2 months ago
- A VSCode devcontainer for development of COFF files with batteries included.☆47Updated last year
- Attack chain emulator. Write recipes for initial access easily☆20Updated last year
- A care package of useful bofs for red team engagments☆48Updated 2 years ago
- Bunch of BOF files☆24Updated 9 months ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 4 months ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆10Updated last year
- winacl, a cross platforms Go library to work with ntSecurityDescriptor.☆23Updated 3 weeks ago
- An In-memory Embedding of CPython☆20Updated 3 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 5 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆31Updated 3 weeks ago
- ☆47Updated last year
- Example of using Sleep to create better named pipes.☆41Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆18Updated 11 months ago
- Python module for running BOFs☆64Updated last year
- Scripts to interact with Microsoft Graph APIs☆31Updated 2 weeks ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆38Updated last year
- in-process powershell runner for BRC4☆37Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆15Updated 2 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 6 months ago
- ☆17Updated last month
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆24Updated 6 months ago
- BOF for C2 framework☆40Updated last week
- Bypassing Amsi using LdrLoadDll☆24Updated last month
- ☆59Updated 3 months ago
- ☆28Updated 5 months ago
- Purple Team Dropper generator using open source templates.☆14Updated 5 months ago
- Multithreaded C# .NET Assembly to enumerate accessible network shares in a domain☆33Updated last year
- ☆46Updated last year