FourCoreLabs / LolDriverScanLinks
Scan vulnerable drivers on Windows with loldrivers.io
☆180Updated last year
Alternatives and similar repositories for LolDriverScan
Users that are interested in LolDriverScan are comparing it to the libraries listed below
Sorting:
- An interactive shell to spoof some LOLBins command line☆184Updated last year
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆126Updated last year
- psexecsvc - a python implementation of PSExec's native service implementation☆202Updated 4 months ago
- Find potential DLL Sideloads on your windows computer☆208Updated 5 months ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆209Updated 8 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 8 months ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆193Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- Different methods to get current username without using whoami☆177Updated last year
- yet another AV killer tool using BYOVD☆292Updated last year
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆310Updated 7 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆117Updated 2 years ago
- ☆201Updated 2 weeks ago
- ☆189Updated last year
- Run Your Payload Without Running Your Payload☆182Updated 2 years ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆166Updated 2 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆228Updated 5 months ago
- ☆221Updated last year
- ☆282Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆222Updated last month
- ☆299Updated 3 months ago
- ☆159Updated last year
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆179Updated 2 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆201Updated last year
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆196Updated 3 months ago
- A collection of tools, scripts and personal research☆133Updated 2 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆173Updated last month
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆245Updated 6 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆139Updated 11 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆147Updated 2 months ago