Dliv3 / DomainBorrowing
Domain Borrowing PoC
☆212Updated 3 years ago
Alternatives and similar repositories for DomainBorrowing:
Users that are interested in DomainBorrowing are comparing it to the libraries listed below
- a patched sshd for red team activities☆81Updated 3 years ago
- ☆159Updated 2 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆187Updated 2 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Updated 3 years ago
- Use to build an anonymous SMB file server.☆229Updated 3 years ago
- Privilege Escalation Via RpcSs svc☆176Updated 3 years ago
- My CobaltStrike BOFS☆162Updated 2 years ago
- ☆167Updated 3 years ago
- 破解CS4.0☆161Updated 5 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆242Updated 3 years ago
- A BeaconEye implement in Golang. It is used to detect the cobaltstrike beacon from memory and extract some configuration.☆155Updated 2 years ago
- just test☆65Updated 2 years ago
- ProxyLogon Pre-Auth SSRF To Arbitrary File Write☆123Updated last year
- Use to check the valid account of the Remote Desktop Protocol(Support plaintext and ntlmhash)☆164Updated 4 years ago
- proxylogon exploit - CVE-2021-26857☆113Updated 4 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆215Updated last year
- Cobalt Strike Aggressor Scripts☆140Updated 4 months ago
- Another Go Shellcode Loader using Windows APIs☆139Updated 3 years ago
- PoC for UUID shellcode execution using DInvoke☆150Updated 4 years ago
- Security Support Provider Interface☆46Updated 4 years ago
- Exploit to SYSTEM for CVE-2021-21551☆237Updated 3 years ago
- Use python to perform Kerberos pre-auth bruteforcing☆195Updated last year
- A simple C implementation to decoded your shellcode and writes it directly to memory☆94Updated 4 years ago
- Project to enumerate proxy configurations and generate shellcode from CobaltStrike☆140Updated 4 years ago
- Automatic ProxyShell Exploit☆113Updated 3 years ago
- Modify version of impacket wmiexec.py, get output(data,response) from registry, don't need SMB connection, also bypassing antivirus-softw…☆279Updated last year
- Resources About Cobalt Strike. 100+ Tools And 200+ Posts.☆249Updated 4 years ago
- Exchange2010 authorized RCE☆154Updated 4 years ago
- This project is 'bridge' between the sleep and python language. It allows the control of a Cobalt Strike teamserver through python withou…☆173Updated last year
- PoC exploits for CVE-2020-17382☆115Updated 4 years ago