CompassSecurity / PowerLsassSilentProcessExit
☆24Updated 3 years ago
Alternatives and similar repositories for PowerLsassSilentProcessExit:
Users that are interested in PowerLsassSilentProcessExit are comparing it to the libraries listed below
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Scripts to interact with Microsoft Graph APIs☆36Updated 5 months ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆66Updated 9 months ago
- Modified version of PEAS client for offensive operations☆40Updated 2 years ago
- ☆2Updated 4 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆30Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- ☆17Updated 6 months ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Updated 3 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 9 months ago
- Find Inbound Email Domains☆22Updated last year
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆21Updated 3 years ago
- ☆47Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- ☆12Updated 2 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Updated 2 years ago
- ☆25Updated 3 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- ☆38Updated 2 years ago
- My BloodHound custom queries☆23Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 2 years ago