EspressoCake / HandleKatz_BOF
A BOF port of the research of @thefLinkk and @codewhitesec
☆96Updated 3 years ago
Alternatives and similar repositories for HandleKatz_BOF:
Users that are interested in HandleKatz_BOF are comparing it to the libraries listed below
- WhoAmI by asking the LDAP service on a domain controller.☆61Updated 3 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆84Updated 2 years ago
- A little scanner to check the LDAP Signing state☆46Updated 3 years ago
- ☆37Updated 2 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆55Updated 3 years ago
- .NET project for installing Persistence☆64Updated 3 years ago
- Cobalt Strike beacon object file that allows you to query and make changes to the Windows Registry☆26Updated 4 years ago
- IOXIDResolver from AirBus Security/PingCastle☆49Updated 4 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Updated 3 years ago
- ☆69Updated 3 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆54Updated 3 years ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆103Updated 3 years ago
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆86Updated 2 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Updated 3 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆51Updated 2 years ago
- Collection of Beacon Object Files (BOFs) for shells and lols☆117Updated 3 years ago
- C# Data Collector for the BloodHound Project, Version 3☆36Updated 3 years ago
- ☆57Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Updated 2 years ago
- A simplified version of DotNetToJScript to create a JScript file which loads a .NET v2 assembly from memory.☆47Updated 4 years ago
- ☆92Updated 3 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 3 years ago
- CNA that interacts with a JAR file to dynamically rename GUI tabs within Cobalt Strike from a JSON file.☆23Updated 2 years ago
- ☆29Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆52Updated 4 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆58Updated 4 years ago
- C# implementation of Get-AADIntSyncCredentials from AADInternals, which extracts Azure AD Connect credentials to AD and Azure AD from AAD…☆38Updated last year
- Beacon Object Files (not Buffer Overflows)☆53Updated 2 years ago
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆25Updated last year
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆138Updated 3 years ago