FourCoreLabs / LolDriverScanLinks
Scan vulnerable drivers on Windows with loldrivers.io
☆182Updated last year
Alternatives and similar repositories for LolDriverScan
Users that are interested in LolDriverScan are comparing it to the libraries listed below
Sorting:
- An interactive shell to spoof some LOLBins command line☆185Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated 2 months ago
- ☆188Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- Collection of random RedTeam scripts.☆207Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆167Updated 10 months ago
- ☆119Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆211Updated 10 months ago
- Evasive Golang Loader☆132Updated last year
- ☆159Updated last year
- Different methods to get current username without using whoami☆178Updated last year
- Command and Control (C2) framework☆128Updated 2 months ago
- ☆283Updated 2 years ago
- Cortex XDR Config Extractor☆133Updated 2 years ago
- Amazing whoami alternatives☆140Updated last year
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆117Updated 2 months ago
- Just some random Red Team Scripts that can be useful☆153Updated last year
- Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination…☆140Updated last year
- ☆221Updated last year
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆190Updated 11 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆244Updated last year
- C2 Automation using Linode☆82Updated 2 years ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- ☆205Updated 2 months ago
- ☆300Updated 9 months ago
- Find potential DLL Sideloads on your windows computer☆210Updated 6 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- ☆181Updated last month
- Python implementation of GhostPack's Seatbelt situational awareness tool☆263Updated 8 months ago