☆27Feb 3, 2026Updated 3 weeks ago
Alternatives and similar repositories for PowerLsassSilentProcessExit
Users that are interested in PowerLsassSilentProcessExit are comparing it to the libraries listed below
Sorting:
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 6 months ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- ☆18Nov 24, 2020Updated 5 years ago
- Convert shellcode generated using pe_2_shellcode to cdb format.☆100Jan 18, 2022Updated 4 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Jul 3, 2021Updated 4 years ago
- ☆39Apr 23, 2024Updated last year
- Tapir: a tool to search through NIST CVE database, with cache and regex.☆16Jan 20, 2023Updated 3 years ago
- Simple and efficient file shredding☆14Sep 23, 2019Updated 6 years ago
- ☆13Nov 24, 2019Updated 6 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆44Feb 3, 2026Updated 3 weeks ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Oct 30, 2018Updated 7 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- The most average C2 ever (MACE)☆97Apr 9, 2022Updated 3 years ago
- A technique for Active Directory domain persistence☆39May 31, 2023Updated 2 years ago
- LDAP Querying without the Suck☆110Nov 9, 2024Updated last year
- DCSync Attack from Outside using Impacket☆115May 2, 2022Updated 3 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 2 months ago
- ☆18Aug 19, 2021Updated 4 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆550Jul 16, 2021Updated 4 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆179Feb 14, 2023Updated 3 years ago
- ☆47Feb 11, 2023Updated 3 years ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Aug 2, 2021Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- Use to copy a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.☆119Apr 22, 2021Updated 4 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆133Nov 5, 2024Updated last year