FatCyclone / D-PwnLinks
D/Invoke standalone shellcode runners
☆39Updated last year
Alternatives and similar repositories for D-Pwn
Users that are interested in D-Pwn are comparing it to the libraries listed below
Sorting:
- A Python POC for CRED1 over SOCKS5☆159Updated 11 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆125Updated 3 weeks ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆116Updated last year
- CLI tool to interact with the BloodHound CE API☆53Updated last month
- a port of privkit bof for havoc☆23Updated last year
- Impacket pre-compiled binaries☆16Updated 2 years ago
- Tools I use on red team engagements and more☆33Updated last year
- ☆71Updated 6 months ago
- Find .net assemblies locally☆124Updated 2 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆90Updated last year
- ☆89Updated 3 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- An impacket-lite cli tool that combines many useful impacket functions using a single session.☆52Updated last month
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆32Updated 8 months ago
- ☆72Updated 2 months ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Updated 3 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆119Updated last year
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆66Updated 8 months ago
- pysnaffler☆102Updated 3 weeks ago
- Simple BOF to read the protection level of a process☆118Updated 2 years ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆44Updated last month
- Brief writeup of post exploitation methodologies.☆18Updated last year
- ☆119Updated 5 months ago
- Serverless Redirector in various cloud vendor for red team☆72Updated 2 years ago
- A tool to verify and create PE Checksums for Portable Executable (PE) files.☆53Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆97Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆54Updated last month
- Terms of Use Conditional Access M365 Evilginx Phishlet☆41Updated 2 months ago
- Fast context enumeration for newly obtained Active Directory credentials.☆64Updated 2 weeks ago