DeEpinGh0st / sRDI-nim
A nim implementation of sRDI
☆17Updated last year
Alternatives and similar repositories for sRDI-nim:
Users that are interested in sRDI-nim are comparing it to the libraries listed below
- ☆39Updated last year
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆38Updated last year
- load assembly executable file in memory☆38Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆44Updated last year
- A Simple PoC☆19Updated 7 months ago
- ☆21Updated last year
- Golang implement winrm client with pass the hash☆30Updated 8 months ago
- Fork & modify of Wireguard's Memmod☆31Updated last year
- query specific user and login IP from remote machine☆17Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆15Updated last year
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆19Updated 9 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Updated last year
- Golang implementation of Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll;☆31Updated 2 years ago
- ☆19Updated 2 years ago
- Cs-Sleep-Mask-Fiber☆17Updated 4 months ago
- ☆45Updated 6 months ago
- dump lsass☆37Updated 2 years ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆32Updated last year
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Updated 2 years ago
- ☆39Updated last year
- Learning notes of amazing Sliver C2 project.☆24Updated last year
- ☆30Updated last year
- Self Cleanup in post-ex job☆48Updated 4 months ago
- Beacon Object File implementation of pwn1sher's KillDefender☆65Updated 2 years ago
- dump lsass tool☆39Updated 2 years ago
- ☆30Updated last year
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆50Updated last year
- 一个普通的BOF用来BypassUAC☆17Updated 9 months ago
- ☆27Updated last year
- ☆10Updated last year