Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.
☆19Jun 12, 2022Updated 3 years ago
Alternatives and similar repositories for collector
Users that are interested in collector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Living Off the Foreign Land setup scripts☆75Feb 26, 2025Updated last year
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- ☆53Sep 16, 2021Updated 4 years ago
- ☆99Sep 20, 2021Updated 4 years ago
- dump lsass tool☆38Oct 10, 2022Updated 3 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 10 months ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 5 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Jan 6, 2023Updated 3 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- ☆88Jul 28, 2022Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆115Oct 21, 2023Updated 2 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Jul 12, 2024Updated last year
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- ☆35Sep 13, 2022Updated 3 years ago
- Azure Offensive Library☆17Oct 18, 2025Updated 5 months ago
- Beacon Object File allowing creation of Beacons in different sessions.☆83May 23, 2022Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- WMI SA stuffs☆30Apr 18, 2022Updated 3 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- Rewrote HellsGate in C# for fun and learning☆86Feb 10, 2022Updated 4 years ago
- Cobalt Strike BOF for quser.exe implementation using Windows API☆87Mar 22, 2023Updated 3 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆61Jul 10, 2024Updated last year
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- AutoStart teamserver and listeners with services☆75Dec 23, 2021Updated 4 years ago
- C# version of MDSec's ParallelSyscalls☆142Jan 9, 2022Updated 4 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago